Splunk Search

How to query for a Week over Week count of hosts reporting to Splunk

mohankesireddy
Path Finder

Is there a better way to report the count of hosts reporting to Splunk week over week other than running the query using index=*

I am not looking for the no of forwarders, I am looking distinct count of host value in all the indexes, |metadata type=hosts do not help as it cannot be used for week over week calculation

index=* earliest=-2w@w latest=@w 
| bucket span=1d _time
| stats count by _time host 
| eval marker=if (_time<relative_time(now(),"-w@w"), "last week","this week")
| eval _time=if(marker=="last week", _time + 7*24*60*60, _time)
| timechart count by marker
Tags (1)
0 Karma
1 Solution

somesoni2
Revered Legend

A faster option is to use the tstats which works on tsidx files, metadata fields including _time. Try something like this

| tstats count WHERE index=* AND (host=slc* OR host=phx* OR host=dcg* OR host=ccg*)  earliest=-2w@w latest=@w  by _time host  | eval marker=if (_time<relative_time(now(),"-w@w"), "last week","this week")
 | eval _time=if(marker=="last week", _time + 7*24*60*60, _time)
 | timechart count by marker

View solution in original post

sushe10
New Member

I have my query like below, but the problem is it shows the same date on both last weeks and this weeks chart when i mouse on the bar chart.

index = isell sourcetype=iSell_sessionslog Region = EU BusinessServiceName= BsSaveSalesOrderList Success = False earliest=-2w@w latest=@w |bucket span=1d _time | eval marker=if (_time
0 Karma

woodcock
Esteemed Legend

Also, for your presentation once you pull the data out, tihink about using timewrap app:
https://splunkbase.splunk.com/app/1645/

somesoni2
Revered Legend

A faster option is to use the tstats which works on tsidx files, metadata fields including _time. Try something like this

| tstats count WHERE index=* AND (host=slc* OR host=phx* OR host=dcg* OR host=ccg*)  earliest=-2w@w latest=@w  by _time host  | eval marker=if (_time<relative_time(now(),"-w@w"), "last week","this week")
 | eval _time=if(marker=="last week", _time + 7*24*60*60, _time)
 | timechart count by marker

mohankesireddy
Path Finder

Thanks Somesh

0 Karma
Get Updates on the Splunk Community!

Building Reliable Asset and Identity Frameworks in Splunk ES

 Accurate asset and identity resolution is the backbone of security operations. Without it, alerts are ...

Cloud Monitoring Console - Unlocking Greater Visibility in SVC Usage Reporting

For Splunk Cloud customers, understanding and optimizing Splunk Virtual Compute (SVC) usage and resource ...

Automatic Discovery Part 3: Practical Use Cases

If you’ve enabled Automatic Discovery in your install of the Splunk Distribution of the OpenTelemetry ...