Splunk Search

How can I see the difference in a count for two different types of events by day?

Esperteyu
Explorer

Hi,

I would like to see the difference in a count for two different type of events per day. Currently I have it in total but not sure how to split it per day

index="index1" ("first string" OR "second string") | eval First=if(searchmatch("first string"),1,0) | eval Second=if(searchmatch("second string"),1,0) | stats sum(First) as FirstChecks sum(Second) as SecopndChecks | eval missing=FirstChecks - SecondChecks

Thanks

0 Karma
1 Solution

DalJeanis
Legend

try this

index="index1" ("first string" OR "second string") 
| bin _time span=1d
| eval First=if(searchmatch("first string"),1,0) 
| eval Second=if(searchmatch("second string"),1,0) 
| stats sum(First) as FirstChecks sum(Second) as SecondChecks by _time 
| eval missing= FirstChecks - SecondChecks

View solution in original post

0 Karma

DalJeanis
Legend

try this

index="index1" ("first string" OR "second string") 
| bin _time span=1d
| eval First=if(searchmatch("first string"),1,0) 
| eval Second=if(searchmatch("second string"),1,0) 
| stats sum(First) as FirstChecks sum(Second) as SecondChecks by _time 
| eval missing= FirstChecks - SecondChecks
0 Karma
Get Updates on the Splunk Community!

ICYMI - Check out the latest releases of Splunk Edge Processor

Splunk is pleased to announce the latest enhancements to Splunk Edge Processor.  HEC Receiver authorization ...

Introducing the 2024 SplunkTrust!

Hello, Splunk Community! We are beyond thrilled to announce our newest group of SplunkTrust members!  The ...

Introducing the 2024 Splunk MVPs!

We are excited to announce the 2024 cohort of the Splunk MVP program. Splunk MVPs are passionate members of ...