Splunk Search

summing two event counts by source

umplebyj
Explorer

so, I am trying to parse out syslog stats data, trying to get a velocity of the events to figure out which log source is spiking when backlogs occur.

events: the count of events for a particular source type
src: the individual device sending logs to the syslog server.

as syslog stats don't reset until syslog is hup'd or otherwise restarted taking the list of events isn't specifically helpful.

So what I'm trying to figure out is how to get a velocity of trying to get something like: stats min(events, by source) and compare it to a stats max(events) by src. However I haven't been able to combine this properly.

Output would preferably be a table that has (src, maxevents, minevents, diff)

Tags (2)
0 Karma
1 Solution

aholzer
Motivator

I think what you are looking for is
| stats min(events) as min_events max(events) as max_events by src
| eval diff = max_events - min_events

Hope this helps

View solution in original post

aholzer
Motivator

I think what you are looking for is
| stats min(events) as min_events max(events) as max_events by src
| eval diff = max_events - min_events

Hope this helps

umplebyj
Explorer

Could have sworn I tried something just like this and it somehow took the max of all sources and min of all sources (even though I through in the by source field)

Anyways, thanks this worked.

0 Karma
Get Updates on the Splunk Community!

Enter the Agentic Era with Splunk AI Assistant for SPL 1.4

  🚀 Your data just got a serious AI upgrade — are you ready? Say hello to the Agentic Era with the ...

Feel the Splunk Love: Real Stories from Real Customers

Hello Splunk Community,    What’s the best part of hearing how our customers use Splunk? Easy: the positive ...

Data Management Digest – November 2025

  Welcome to the inaugural edition of Data Management Digest! As your trusted partner in data innovation, the ...