Knowledge Management

collect command - count value changing with time.

arjit
Path Finder

Hi All, 

I have created a scheduled reports (its not accelerated or summary indexed) and event count is populated into another index via collect command: 

index=xxxx host=yyyyy| stats count
| addinfo
| eval _time = info_min_time
| collect index=xyz_summary sourcetype="Trip Plans Other Apps" addTime=T

please note:

- the indexname contains summary but this index is not a summary index. 

- Report runs at morning 7 o'clock for the previous day's data and the _time is overwritten to previous date. This is done so that the count is logged in as previous day's data.  

The issue which we are facing here is when we run the same query for that time period after a few days( say a month), we are observing the value inside the index=xyz_summary (i.e. count value) is greater than when we run the original query. Interestingly, the results were both the same, when I ran both queries initially a month before.  

Any suggestions why is this happening (is it due to collect command) ? what modification can be done so that we dont get a mismatch here.    

Thanks in advance. 

Kind regards

AG. 

 

 

Labels (2)
0 Karma
Get Updates on the Splunk Community!

Enterprise Security Content Update (ESCU) | New Releases

In December, the Splunk Threat Research Team had 1 release of new security content via the Enterprise Security ...

Why am I not seeing the finding in Splunk Enterprise Security Analyst Queue?

(This is the first of a series of 2 blogs). Splunk Enterprise Security is a fantastic tool that offers robust ...

Index This | What are the 12 Days of Splunk-mas?

December 2024 Edition Hayyy Splunk Education Enthusiasts and the Eternally Curious!  We’re back with another ...