Splunk Enterprise

Calculate difference

AB24
Loves-to-Learn Everything
 
Labels (2)
0 Karma

ITWhisperer
SplunkTrust
SplunkTrust

Try something like this

| where Device_Info == "Device Number" OR match(Device_Info,"\d+")
| streamstats count(eval(Device_Info=="Device Number")) as Inspection_Count
| stats values(eval(if(match(Device_Info, "\d+"),Device_Info,null()))) as Device_Info range(_time) as total_duration by Inspection_Count
| where total_duration > 0
| streamstats reset_on_change=t count as Inspection_Count by Device_Info
| eventstats sum(total_duration) as sum_duration by Device_Info
| eval total_duration = total_duration / 60
| eval sum_duration = sum_duration / 60
0 Karma

AB24
Loves-to-Learn Everything

Thanks

0 Karma

ITWhisperer
SplunkTrust
SplunkTrust

Remove the reset_on_change=t

0 Karma

AB24
Loves-to-Learn Everything

Some Device_Info are merging in the result instead of one device_info per row it is two device_info per row

 

0 Karma

ITWhisperer
SplunkTrust
SplunkTrust

Perhaps if you shared some of your real events and results and your SPL, we might be able to advise you further. Vague descriptions of the issue and fake data means we can only offer solutions based what you have provided, and to that extent, the solution provided does work (but only with the fake data you provided)!

0 Karma
Get Updates on the Splunk Community!

Data Management Digest – December 2025

Welcome to the December edition of Data Management Digest! As we continue our journey of data innovation, the ...

Index This | What is broken 80% of the time by February?

December 2025 Edition   Hayyy Splunk Education Enthusiasts and the Eternally Curious!    We’re back with this ...

Unlock Faster Time-to-Value on Edge and Ingest Processor with New SPL2 Pipeline ...

Hello Splunk Community,   We're thrilled to share an exciting update that will help you manage your data more ...