Splunk Search

Searching where a difference in fields is greater than 1.

tslnmx
Explorer

My log messages have two fields I'd like to search on: engineElapsed and serviceElapsed. I'm interested in looking at all the records where engineElapsed - serviceElapsed > 1.

I'm new to Splunk, and have discovered I can do do something like this:

* | eval time=engineElapsed-serviceElapsed | timechart avg(time) by user

But since I need to see individual log messages, something like this might be more suited -- if it worked, that is:

eval(engineElapsed-serviceElapsed)

Help would be appreciated 🙂

Tags (1)
1 Solution

dwaddle
SplunkTrust
SplunkTrust

Have you tried this?

* | where (engineElapsed - serviceElapsed) > 1

View solution in original post

dwaddle
SplunkTrust
SplunkTrust

Have you tried this?

* | where (engineElapsed - serviceElapsed) > 1

tslnmx
Explorer

Well now I just feel silly :). All my searching, and I never found the 'where' command. Thank you!

Career Survey
First 500 qualified respondents will receive a $20 gift card! Tell us about your professional Splunk journey.

Can’t make it to .conf25? Join us online!

Get Updates on the Splunk Community!

Can’t Make It to Boston? Stream .conf25 and Learn with Haya Husain

Boston may be buzzing this September with Splunk University and .conf25, but you don’t have to pack a bag to ...

Splunk Lantern’s Guide to The Most Popular .conf25 Sessions

Splunk Lantern is a Splunk customer success center that provides advice from Splunk experts on valuable data ...

Unlock What’s Next: The Splunk Cloud Platform at .conf25

In just a few days, Boston will be buzzing as the Splunk team and thousands of community members come together ...