Splunk Search

How to count a sum of events since a specified time?

ssackrider
Explorer

How to count how many events are over 1 yr old? And better yet, how to show a pie chart comparing against the entire list?

0 Karma
1 Solution

javiergn
Super Champion

I'm sure there will be other ways to achieve the same. Anyway, try this:

| metasearch index=foo sourcetype=bar
| eval year = relative_time(now(), "-1y")
| eval age = if(_time < year, "old", "new")
| stats count by age

Then go to the visualization tab and select Pie.

View solution in original post

0 Karma

javiergn
Super Champion

I'm sure there will be other ways to achieve the same. Anyway, try this:

| metasearch index=foo sourcetype=bar
| eval year = relative_time(now(), "-1y")
| eval age = if(_time < year, "old", "new")
| stats count by age

Then go to the visualization tab and select Pie.

0 Karma

ssackrider
Explorer

Wow-- Never thought of metasearch OR starting with a pipe.. but it works.. Thanks!

0 Karma
Get Updates on the Splunk Community!

Automatic Discovery Part 1: What is Automatic Discovery in Splunk Observability Cloud ...

If you’ve ever deployed a new database cluster, spun up a caching layer, or added a load balancer, you know it ...

Real-Time Fraud Detection: How Splunk Dashboards Protect Financial Institutions

Financial fraud isn't slowing down. If anything, it's getting more sophisticated. Account takeovers, credit ...

Splunk + ThousandEyes: Correlate frontend, app, and network data to troubleshoot ...

 Are you tired of troubleshooting delays caused by siloed frontend, application, and network data? We've got a ...