Splunk Search

different time ranges or tricks

0range
Communicator

How can I compare an average count of events per minute in last 15 minutes (for example) and the number of events during the last one minute?

Tags (1)
0 Karma
1 Solution

0range
Communicator

Sorry, I get.

Smth like this:

eval eventcount = 1 |
eval eventcountlast = if(now() - _time <= 60, 1, 0) |
stats sum(eventcount) as prev, sum(eventcountlast) as last |
where last < (prev/15)/3

View solution in original post

0 Karma

0range
Communicator

Sorry, I get.

Smth like this:

eval eventcount = 1 |
eval eventcountlast = if(now() - _time <= 60, 1, 0) |
stats sum(eventcount) as prev, sum(eventcountlast) as last |
where last < (prev/15)/3

0 Karma
Get Updates on the Splunk Community!

Index This | What goes up and never comes down?

January 2026 Edition  Hayyy Splunk Education Enthusiasts and the Eternally Curious!   We’re back with this ...

Splunkers, Pack Your Bags: Why Cisco Live EMEA is Your Next Big Destination

The Power of Two: Splunk &#43; Cisco at "Ludicrous Scale"   You know Splunk. You know Cisco. But have you seen ...

Data Management Digest – January 2026

Welcome to the January 2026 edition of Data Management Digest! Welcome to the January 2026 edition of Data ...