Splunk Search

search with same field diferent dates into a table side by side

rsaude
Path Finder

i want to verify if there is a difference in 2 counts made that relate to diferent timelines.

This is what i've came up with

index="tenablesc" sourcetype="tenable:sc:assets" 
| dedup ip 
| stats count(ip) as "Number of machines Detected(All time)" 
| append 
    [ search index="teenablesc" sourcetype="tenable:sc:assets" earliest=-14d 
    | dedup ip 
    | stats count(ip) as "Number of machines Detected(Past 14 days)" ]

and the output is the following:alt text

I would like to put both on the same line, or even if possible just have one field that is the difference between both values

Thank you for any help you can provide

Tags (2)
0 Karma
1 Solution

rsaude
Path Finder

I kinda dumb just use a join instead of an append.
I wont delete the question because it might be usefull to others

View solution in original post

0 Karma

wmyersas
Builder

instead of doing a | dedup ip | stats count(ip)...you can just do | stats dc(ip) as ...

It's faster, and simpler

0 Karma

rsaude
Path Finder

I kinda dumb just use a join instead of an append.
I wont delete the question because it might be usefull to others

0 Karma

gcusello
SplunkTrust
SplunkTrust

explore the use of wimewrap!

Ciao.
Giuseppe

0 Karma
Career Survey
First 500 qualified respondents will receive a $20 gift card! Tell us about your professional Splunk journey.
Get Updates on the Splunk Community!

Tech Talk Recap | Mastering Threat Hunting

Mastering Threat HuntingDive into the world of threat hunting, exploring the key differences between ...

Observability for AI Applications: Troubleshooting Latency

If you’re working with proprietary company data, you’re probably going to have a locally hosted LLM or many ...

Splunk AI Assistant for SPL vs. ChatGPT: Which One is Better?

In the age of AI, every tool promises to make our lives easier. From summarizing content to writing code, ...