Splunk Search

How to calculate difference between field values in two events?

vikas_sood
Explorer

Hi,

i have 2 events with 3 fields: timestamp , servername, cpu_usage:

22-Mar-2022 00:00:00, server1 ,18

23-Mar-2022, 00:01:00 server1 , 82

22-Mar-2022 00:00:00, server2 ,78

23-Mar-2022, 00:01:00 server2 , 14

I want to calculate difference between 2nd and 1st event for each server. Can you please suggest, how this can be done?

Labels (4)
Tags (1)
0 Karma

ITWhisperer
SplunkTrust
SplunkTrust
| stats range(cpu_usage) as difference by servername
0 Karma

vikas_sood
Explorer

That works, is it possible to add + and - in difference?

Tags (1)
0 Karma

ITWhisperer
SplunkTrust
SplunkTrust
| stats first(cpu_usage) as first_value last(cpu_usage) as last_value by servername
| eval difference=last_value-first_value
| eval difference=if(difference>0,"+".difference,difference)
0 Karma
Get Updates on the Splunk Community!

Index This | Why do they call it hyper text?

November 2023 Edition Hayyy Splunk Education Enthusiasts and the Eternally Curious!  We’re back with another ...

State of Splunk Careers 2023: Career Resilience and the Continued Value of Splunk

For the past three years, Splunk has partnered with Enterprise Strategy Group to conduct a survey that gauges ...

The Great Resilience Quest: 9th Leaderboard Update

The ninth leaderboard update (11.9-11.22) for The Great Resilience Quest is out >> Kudos to all the ...