Splunk Search

Add a column that is the difference of the first two columns.

Username1
Path Finder

So suppose that everyday Splunk takes in a report that houses 9 different fields, one of which is called 'status'. Status has the option of being 'New', 'Closed', or 'Open'. I'm trying to show a time-chart that shows the count per day of reports that have 'Closed' and 'New' status , along with the difference of the two (everyday). So a file with report_date '2020-07-23' is ingested in Splunk and shows we had 5 'New' reports, 7 'Closed' Reports, so the difference should be 2 for that day. How do I go about doing this in my search query?

 

index=blah... | timechart count(report_date) by status| fields - OPEN

 

This is where I'm stuck, how do I get the difference of only NEW and CLOSED included into my graph. Thanks in advance

Labels (5)
0 Karma
1 Solution

richgalloway
SplunkTrust
SplunkTrust

This should do it.

index=blah... | timechart count(report_date) by status
| fields - OPEN
| eval diff=abs(New - Closed)
---
If this reply helps you, Karma would be appreciated.

View solution in original post

richgalloway
SplunkTrust
SplunkTrust

This should do it.

index=blah... | timechart count(report_date) by status
| fields - OPEN
| eval diff=abs(New - Closed)
---
If this reply helps you, Karma would be appreciated.

Username1
Path Finder

That worked perfectly. Thank you!

0 Karma
Get Updates on the Splunk Community!

Enterprise Security Content Update (ESCU) | New Releases

In December, the Splunk Threat Research Team had 1 release of new security content via the Enterprise Security ...

Why am I not seeing the finding in Splunk Enterprise Security Analyst Queue?

(This is the first of a series of 2 blogs). Splunk Enterprise Security is a fantastic tool that offers robust ...

Index This | What are the 12 Days of Splunk-mas?

December 2024 Edition Hayyy Splunk Education Enthusiasts and the Eternally Curious!  We’re back with another ...