Splunk Search

how to compare compare stats counts and highlight in new field ?

corehan
Explorer

Hello dear,

I want to compare stats count for same host and counts are not equal than create a new field and put "!" or whatever.

Hostname | Interface | Status | count | Alert

Scenario 1 ( clear, no alert )
HostA | InterfaceA | InterfaceA-up | 8
HostA | InterfaceA | InterfaceA-down | 8 |

Scenario 2 (Alert)
HostA | InterfaceA | InterfaceA-up | 8
HostA | InterfaceA | InterfaceA-down | 9 | !!!!!!!!!!!!!!!

Regards.

Tags (1)
0 Karma

corehan
Explorer

Thank you. But i have already stats count section and i can't combined with this new future;

Existing stats count;

|stats count by Date,host_name,ifName,Status |sort -count -ifName -Status -host_name

Regards:

0 Karma

to4kawa
Ultra Champion

But i have already stats count section
so, you can't combine .

0 Karma

corehan
Explorer

I must ses Hostname,Interface and Status at the same time, Interface and Status not enough for me 😞

0 Karma

to4kawa
Ultra Champion

I see, I'm sorry to waste your time.

0 Karma
Get Updates on the Splunk Community!

Celebrate CX Day with Splunk: Take our interactive quiz, join our LinkedIn Live ...

Today and every day, Splunk celebrates the importance of customer experience throughout our product, ...

How to Get Started with Splunk Data Management Pipeline Builders (Edge Processor & ...

If you want to gain full control over your growing data volumes, check out Splunk’s Data Management pipeline ...

Out of the Box to Up And Running - Streamlined Observability for Your Cloud ...

  Tech Talk Streamlined Observability for Your Cloud Environment Register    Out of the Box to Up And Running ...