Splunk Search

How can I count the difference from two days?

jfriedrich
New Member

Hi Splunk colleagues,

I need the following output:
Day 1 difference to Day2 = + or - in counts to see the trend of errormessages.

It is a multitude of times in the timerange to select and then by eye to compare the numbers...

My Search for today is following:

    * | chart count by sourcetype, ERRORCODE | sort -count

Day 1: (for example today)

sourcetype  ERRORCODE2  ERRORCODE2  ERRORCODE3
WIN32   0   0   138
UNIX    0   0      60
AUTO    0   0     844
LDAP    0   24   703

Day 2:

sourcetype  ERRORCODE2  ERRORCODE2  ERRORCODE3
WIN32   5   0   138
UNIX    0   0      60
AUTO    0   8      0
LDAP    1   24  100
0 Karma

oda
Communicator

Is the error code correct?
You can make it if you have decided.

  • | eval test=sourcetype+"__"+ERRORCODE | bucket _time span=1d | chart count by _time,test | sort -count | delta | delta …

Try it!

0 Karma

somesoni2
Revered Legend

Can you post expected output based on the sample data you posted in question?

0 Karma

jfriedrich
New Member

I am open for suggestions maybe the result can be:
math: (day1count - day2count) = daycountdifference

day1count: 15
day2count: 20
daycountdifference: -5

0 Karma
Get Updates on the Splunk Community!

Index This | Forward, I’m heavy; backward, I’m not. What am I?

April 2024 Edition Hayyy Splunk Education Enthusiasts and the Eternally Curious!  We’re back with another ...

A Guide To Cloud Migration Success

As enterprises’ rapid expansion to the cloud continues, IT leaders are continuously looking for ways to focus ...

Join Us for Splunk University and Get Your Bootcamp Game On!

If you know, you know! Splunk University is the vibe this summer so register today for bootcamps galore ...