Splunk Enterprise Security

search which finds the addition or deletion to the log sources happened since last week by index and loss/gain must be specified in percentage

smithahc1966
New Member

I am trying to write a search which finds the addition or deletion to the log sources happened since last week by index and loss/gain must be specified in percentage.

0 Karma

lakshman239
Influencer

One option would be to schedule a search to get source, sourcetype and index and output the results to a summary index and then you can run searches against that to compare for any days.

 | tstats count where index=* groupby index, sourcetype, source, _time span=1d | collect index=summary

The above will store the results to summary index and you can then schedule another search to look for changes by sourcetype or source and then cal the perc

0 Karma
Get Updates on the Splunk Community!

Customer Experience | Splunk 2024: New Onboarding Resources

In 2023, we were routinely reminded that the digital world is ever-evolving and susceptible to new ...

Celebrate CX Day with Splunk: Take our interactive quiz, join our LinkedIn Live ...

Today and every day, Splunk celebrates the importance of customer experience throughout our product, ...

How to Get Started with Splunk Data Management Pipeline Builders (Edge Processor & ...

If you want to gain full control over your growing data volumes, check out Splunk’s Data Management pipeline ...