Splunk Search

Streamstats change state count

ips_mandar
Builder

Hi below is my sample data-

Date                       source                State
 29-05-20 01:00:00            abc                 On
 29-05-20 01:10:00            abc                 Off
 29-05-20 01:20:00            abc                 On
 29-05-20 01:30:00            abc                 On
 29-05-20 01:50:00            abc                 Off
 29-05-20 01:55:00            abc                 On

Here I want to calculate "Number of Times State Went from On to Off" and "Number of Times State Went from Off to On" using streamstats command.
In above case results will be-

source|date| "Number of Times State Went from On to Off" |"Number of Times State Went from Off to On"|"Number of RunSwitch ONs"|"Number of RunSwitch Offs"
    abc    |29-05-20    | 2          | 2           |4          |2

with help of @kamlesh_vaghela I am able to extract first two columns and now my new requirement is to add above four columns.
Ref-https://answers.splunk.com/answers/825891/streamstats-change-state-count.html
Note- I want above all these by each source.

Labels (1)
0 Karma
1 Solution

kamlesh_vaghela
SplunkTrust
SplunkTrust

@ips_mandar

For this requirement, I would like to suggest you below search.

YOUR_SEARCH | streamstats window=2 list(State) as S 
| eval Status=case(mvindex(S,0)="On" AND mvindex(S,1)="Off","Number of Times State Went from On to Off",mvindex(S,0)="Off" AND mvindex(S,1)="On","Number of Times State Went from Off to On")
| stats count(eval(State="On")) as "Number of RunSwitch ONs"  count(eval(State="Off")) as "Number of RunSwitch Offs" count(eval(Status="Number of Times State Went from On to Off")) as "Number of Times State Went from On to Off" count(eval(Status="Number of Times State Went from Off to On")) as "Number of Times State Went from Off to On"
| table "Number of Times State Went from On to Off" "Number of Times State Went from Off to On" "Number of RunSwitch ONs" "Number of RunSwitch Offs"

Sample Search:

| makeresults 
| eval _raw="Date,State
29-05-20 01:00:00,On
29-05-20 01:10:00,Off
29-05-20 01:20:00,On
29-05-20 01:30:00,On
29-05-20 01:50:00,Off
29-05-20 01:55:00,On" 
| multikv forceheader=1 
| table Date State 
| streamstats window=2 list(State) as S 
| eval Status=case(mvindex(S,0)="On" AND mvindex(S,1)="Off","Number of Times State Went from On to Off",mvindex(S,0)="Off" AND mvindex(S,1)="On","Number of Times State Went from Off to On")
| stats count(eval(State="On")) as "Number of RunSwitch ONs"  count(eval(State="Off")) as "Number of RunSwitch Offs" count(eval(Status="Number of Times State Went from On to Off")) as "Number of Times State Went from On to Off" count(eval(Status="Number of Times State Went from Off to On")) as "Number of Times State Went from Off to On"
| table "Number of Times State Went from On to Off" "Number of Times State Went from Off to On" "Number of RunSwitch ONs" "Number of RunSwitch Offs"

Thanks

View solution in original post

0 Karma

kamlesh_vaghela
SplunkTrust
SplunkTrust

@ips_mandar

For this requirement, I would like to suggest you below search.

YOUR_SEARCH | streamstats window=2 list(State) as S 
| eval Status=case(mvindex(S,0)="On" AND mvindex(S,1)="Off","Number of Times State Went from On to Off",mvindex(S,0)="Off" AND mvindex(S,1)="On","Number of Times State Went from Off to On")
| stats count(eval(State="On")) as "Number of RunSwitch ONs"  count(eval(State="Off")) as "Number of RunSwitch Offs" count(eval(Status="Number of Times State Went from On to Off")) as "Number of Times State Went from On to Off" count(eval(Status="Number of Times State Went from Off to On")) as "Number of Times State Went from Off to On"
| table "Number of Times State Went from On to Off" "Number of Times State Went from Off to On" "Number of RunSwitch ONs" "Number of RunSwitch Offs"

Sample Search:

| makeresults 
| eval _raw="Date,State
29-05-20 01:00:00,On
29-05-20 01:10:00,Off
29-05-20 01:20:00,On
29-05-20 01:30:00,On
29-05-20 01:50:00,Off
29-05-20 01:55:00,On" 
| multikv forceheader=1 
| table Date State 
| streamstats window=2 list(State) as S 
| eval Status=case(mvindex(S,0)="On" AND mvindex(S,1)="Off","Number of Times State Went from On to Off",mvindex(S,0)="Off" AND mvindex(S,1)="On","Number of Times State Went from Off to On")
| stats count(eval(State="On")) as "Number of RunSwitch ONs"  count(eval(State="Off")) as "Number of RunSwitch Offs" count(eval(Status="Number of Times State Went from On to Off")) as "Number of Times State Went from On to Off" count(eval(Status="Number of Times State Went from Off to On")) as "Number of Times State Went from Off to On"
| table "Number of Times State Went from On to Off" "Number of Times State Went from Off to On" "Number of RunSwitch ONs" "Number of RunSwitch Offs"

Thanks

0 Karma

ips_mandar
Builder

Thank you! your query search results taking less time than other hence accepting your answer.

0 Karma

renjith_nair
Legend

@ips_mandar ,

Adding to the previous search, try

"Your search"
| streamstats window=2 list(State) as S | eval Status=case(mvindex(S,0)="On" AND mvindex(S,1)="Off","Number of Times State Went from On to Off",mvindex(S,0)="Off" AND mvindex(S,1)="On","Number of Times State Went from Off to On")
 |eventstats count(eval(State=="On")) as On,count(eval(State=="Off")) as Off
| stats first(On) as "Number of RunSwitch ONs",first(Off) as "Number of RunSwitch Offs",count by Status
| eval {Status}=count
| fields - Status,count
| stats values(*) as *
---
What goes around comes around. If it helps, hit it with Karma 🙂

ips_mandar
Builder

Thank you

0 Karma
Get Updates on the Splunk Community!

Built-in Service Level Objectives Management to Bridge the Gap Between Service & ...

Wednesday, May 29, 2024  |  11AM PST / 2PM ESTRegister now and join us to learn more about how you can ...

Get Your Exclusive Splunk Certified Cybersecurity Defense Engineer Certification at ...

We’re excited to announce a new Splunk certification exam being released at .conf24! If you’re headed to Vegas ...

Share Your Ideas & Meet the Lantern team at .Conf! Plus All of This Month’s New ...

Splunk Lantern is Splunk’s customer success center that provides advice from Splunk experts on valuable data ...