Splunk Enterprise Security

search which finds the addition or deletion to the log sources happened since last week by index and loss/gain must be specified in percentage

smithahc1966
New Member

I am trying to write a search which finds the addition or deletion to the log sources happened since last week by index and loss/gain must be specified in percentage.

0 Karma

lakshman239
SplunkTrust
SplunkTrust

One option would be to schedule a search to get source, sourcetype and index and output the results to a summary index and then you can run searches against that to compare for any days.

 | tstats count where index=* groupby index, sourcetype, source, _time span=1d | collect index=summary

The above will store the results to summary index and you can then schedule another search to look for changes by sourcetype or source and then cal the perc

0 Karma
Get Updates on the Splunk Community!

Splunk Forwarders and Forced Time Based Load Balancing

Splunk customers use universal forwarders to collect and send data to Splunk. A universal forwarder can send ...

NEW! Log Views in Splunk Observability Dashboards Gives Context From a Single Page

Today, Splunk Observability releases log views, a new feature for users to add their logs data from Splunk Log ...

Last Chance to Submit Your Paper For BSides Splunk - Deadline is August 12th!

Hello everyone! Don't wait to submit - The deadline is August 12th! We have truly missed the community so ...