Splunk Search

Difference bewteen two variable date reports, considering the direction

ABurk
New Member

Hello,

I'm trying to create a search that shows what results are missing today - a, compared to yesterday - b.
a and b are inputs on a dashbaord so I could also compare 2 weeks ago with today.
I can't do a "search of today NOT [subsearch with results from yesterday] because I need to use | operations before.
It feels like a simple problem that for sure was solved 100 times but I don't get it.
What I have so far is only the difference, but it also shows if something new was added today, but was not there yesterday.

index=myindex sourcetype=special_list
| eval deleted=case(Deleted="Yes", "Deleted", Deleted="No", "Active")
| eval date=strftime(_time, "%F")
| where date="2019-09-27" OR date="2019-09-26"
| stats count as Total by FullName
| where Total=1

Example:
Compare 2019-09-22

  • A
  • B
  • C
  • D

with 2019-09-27

  • A
  • B
  • D

Result: C

Any help highly appreciated
Cheers

0 Karma
1 Solution

gcusello
SplunkTrust
SplunkTrust

Hi ABurk,
try something like this

 index=myindex sourcetype=special_list
 | eval deleted=case(Deleted="Yes", "Deleted", Deleted="No", "Active")
 | eval date=strftime(_time, "%F")
 | where date="2019-09-27" OR date="2019-09-26"
 | stats values(date) AS date count as Total by FullName
 | where Total=1 AND date="2019-09-27"

if it doesn't run use "search" instead "where".

Bye.
Giuseppe

View solution in original post

gcusello
SplunkTrust
SplunkTrust

Hi ABurk,
try something like this

 index=myindex sourcetype=special_list
 | eval deleted=case(Deleted="Yes", "Deleted", Deleted="No", "Active")
 | eval date=strftime(_time, "%F")
 | where date="2019-09-27" OR date="2019-09-26"
 | stats values(date) AS date count as Total by FullName
 | where Total=1 AND date="2019-09-27"

if it doesn't run use "search" instead "where".

Bye.
Giuseppe

ABurk
New Member

Thanks for the answer, I used

index=myindex sourcetype=special_list
| eval date=strftime(_time, "%F") 
| where date like "2019-09-27"
| search NOT
    [search index=myindex sourcetype=special_list
    | eval date=strftime(_time, "%F")
    | where date like "2019-09-26"
    | eventstats count by FullName
    | table FullName] 
| eventstats count by FullName
| table FullName, Path

I think I did some syntax wrong with the |search in the past because I'm sure I tried before..

0 Karma

gcusello
SplunkTrust
SplunkTrust

Hi ABurk,
Your search should correctly run if you're sure that your subsearch has less than 50,000 results.

Bye, see next time.
Giuseppe

0 Karma
Got questions? Get answers!

Join the Splunk Community Slack to learn, troubleshoot, and make connections with fellow Splunk practitioners in real time!

Meet up IRL or virtually!

Join Splunk User Groups to connect and learn in-person by region or remotely by topic or industry.

Get Updates on the Splunk Community!

Observability Simplified: Combining User Experience, Application Performance & ...

Tech Talk Observability Simplified: Combining User Experience, Application Performance & Network ...

Event Series May & June: From Network Visibility to Service Intelligence

Unifying the Network: Moving from Alert Noise to Service Intelligence with Splunk ITSI In today’s hybrid ...

Global Splunk User Group Events: May + June 2026

Your Splunk Community Awaits: Discover Upcoming User Group Events Worldwide    Staying ahead in the fast-paced ...