Splunk Search

Comparing information based on _time and calculated value

Brainstorms
Explorer

I have looked for solutions but I have mostly found results regarding only current and past time comparison which is not what I need.

I have a query that bins _time by 24h spans over the previous 7 days. and calculates a numeric value associated with those time spans. What I need is to compare each day's values to the entire week's and find any time period (so 48h) where the number jumped significantly. 

An example of something similar to my my code:

index=sandwiches saved_search_name="yum" earliest=-7d
| bin span=24h _time
| search sandwich_type="PB&J"
| stats count by total_bread_type _time
| stats sum(total_bread_type) as bread by _time
| eval bread = round(bread / 10000, 2)

currently the results are like this:

_timebread
2021-12-22 18:0022
2021-12-23 18:0023
2021-12-24 18:0021
2021-12-25 18:0047
2021-12-26 18:0048
2021-12-27 18:0046
2021-12-28 18:0047


Basically I am looking to compare the 'bread' values by _time and figure out if/where there is a jump of 10 or more and return that data.

Any insight would be appreciated. Thanks!

Labels (1)
Tags (1)
0 Karma
1 Solution

richgalloway
SplunkTrust
SplunkTrust

Try this.  The streamstats command takes the difference between adjacent results then we filter for a jump of more than 10.

index=sandwiches saved_search_name="yum" earliest=-7d
| bin span=24h _time
| search sandwich_type="PB&J"
| stats count by total_bread_type _time
| stats sum(total_bread_type) as bread by _time
| eval bread = round(bread / 10000, 2)
| streamstats window=2 range(bread) as diff
| where diff > 10
---
If this reply helps you, Karma would be appreciated.

View solution in original post

richgalloway
SplunkTrust
SplunkTrust

Try this.  The streamstats command takes the difference between adjacent results then we filter for a jump of more than 10.

index=sandwiches saved_search_name="yum" earliest=-7d
| bin span=24h _time
| search sandwich_type="PB&J"
| stats count by total_bread_type _time
| stats sum(total_bread_type) as bread by _time
| eval bread = round(bread / 10000, 2)
| streamstats window=2 range(bread) as diff
| where diff > 10
---
If this reply helps you, Karma would be appreciated.

Brainstorms
Explorer

That did the trick! Thank you so much Rich.

0 Karma
Get Updates on the Splunk Community!

Stay Connected: Your Guide to November Tech Talks, Office Hours, and Webinars!

🍂 Fall into November with a fresh lineup of Community Office Hours, Tech Talks, and Webinars we’ve ...

Transform your security operations with Splunk Enterprise Security

Hi Splunk Community, Splunk Platform has set a great foundation for your security operations. With the ...

Splunk Admins and App Developers | Earn a $35 gift card!

Splunk, in collaboration with ESG (Enterprise Strategy Group) by TechTarget, is excited to announce a ...