Splunk Search

Searching where a difference in fields is greater than 1.

tslnmx
Explorer

My log messages have two fields I'd like to search on: engineElapsed and serviceElapsed. I'm interested in looking at all the records where engineElapsed - serviceElapsed > 1.

I'm new to Splunk, and have discovered I can do do something like this:

* | eval time=engineElapsed-serviceElapsed | timechart avg(time) by user

But since I need to see individual log messages, something like this might be more suited -- if it worked, that is:

eval(engineElapsed-serviceElapsed)

Help would be appreciated 🙂

Tags (1)
1 Solution

dwaddle
SplunkTrust
SplunkTrust

Have you tried this?

* | where (engineElapsed - serviceElapsed) > 1

View solution in original post

dwaddle
SplunkTrust
SplunkTrust

Have you tried this?

* | where (engineElapsed - serviceElapsed) > 1

tslnmx
Explorer

Well now I just feel silly :). All my searching, and I never found the 'where' command. Thank you!

Get Updates on the Splunk Community!

[Puzzles] Solve, Learn, Repeat: Dynamic formatting from XML events

This challenge was first posted on Slack #puzzles channelFor a previous puzzle, I needed a set of fixed-length ...

Enter the Agentic Era with Splunk AI Assistant for SPL 1.4

  🚀 Your data just got a serious AI upgrade — are you ready? Say hello to the Agentic Era with the ...

Stronger Security with Federated Search for S3, GCP SQL & Australian Threat ...

Splunk Lantern is a Splunk customer success center that provides advice from Splunk experts on valuable data ...