Splunk Search

Using StreamStats/Other commands

rsathish47
Contributor

Hi All,
I have data like following in need to get the differents count. Count will get reset in certain time period. Please help

Expample Data

Time Count Server

1 0 A

1 2 B

1 8 C

1 1 D

2 2 A

2 4 B

2 0 C

2 2 D

3 2 A

3 2 B

3 14 C

3 8 D

Result Table

A =2

B = 4

C= 14

D= 7

Thanks
Sathish

Tags (2)
0 Karma
1 Solution

Ayn
Legend

Not sure why you'd need streamstats. streamstats does not have a time-based window parameter, only number of events.

You could simply do

... | stats range(Count) as diff by Server

View solution in original post

Ayn
Legend

Not sure why you'd need streamstats. streamstats does not have a time-based window parameter, only number of events.

You could simply do

... | stats range(Count) as diff by Server
Get Updates on the Splunk Community!

Now Available: Cisco Talos Threat Intelligence Integrations for Splunk Security Cloud ...

At .conf24, we shared that we were in the process of integrating Cisco Talos threat intelligence into Splunk ...

Preparing your Splunk Environment for OpenSSL3

The Splunk platform will transition to OpenSSL version 3 in a future release. Actions are required to prepare ...

Easily Improve Agent Saturation with the Splunk Add-on for OpenTelemetry Collector

Agent Saturation What and Whys In application performance monitoring, saturation is defined as the total load ...