Splunk Search

how to compare compare stats counts and highlight in new field ?

corehan
Explorer

Hello dear,

I want to compare stats count for same host and counts are not equal than create a new field and put "!" or whatever.

Hostname | Interface | Status | count | Alert

Scenario 1 ( clear, no alert )
HostA | InterfaceA | InterfaceA-up | 8
HostA | InterfaceA | InterfaceA-down | 8 |

Scenario 2 (Alert)
HostA | InterfaceA | InterfaceA-up | 8
HostA | InterfaceA | InterfaceA-down | 9 | !!!!!!!!!!!!!!!

Regards.

Tags (1)
0 Karma

corehan
Explorer

Thank you. But i have already stats count section and i can't combined with this new future;

Existing stats count;

|stats count by Date,host_name,ifName,Status |sort -count -ifName -Status -host_name

Regards:

0 Karma

to4kawa
Ultra Champion

But i have already stats count section
so, you can't combine .

0 Karma

corehan
Explorer

I must ses Hostname,Interface and Status at the same time, Interface and Status not enough for me 😞

0 Karma

to4kawa
Ultra Champion

I see, I'm sorry to waste your time.

0 Karma
Get Updates on the Splunk Community!

New in Observability - Improvements to Custom Metrics SLOs, Log Observer Connect & ...

The latest enhancements to the Splunk observability portfolio deliver improved SLO management accuracy, better ...

Improve Data Pipelines Using Splunk Data Management

  Register Now   This Tech Talk will explore the pipeline management offerings Edge Processor and Ingest ...

3-2-1 Go! How Fast Can You Debug Microservices with Observability Cloud?

Register Join this Tech Talk to learn how unique features like Service Centric Views, Tag Spotlight, and ...