Splunk Search

time frame calculation

sarit_s
Communicator

Hello
i want to write IF statement as part of my query and want it to run on time frame of 30 days or more...
the query itself runs on time frame of "all time" but the result i want is from 30 days or more

how can i do it ?

thanks

0 Karma

DalJeanis
Legend

let's suppose you want a count and average Value of all the records that match some criteria in the 30 days prior to the end of a report. You can do something like this:

your search that gets all your data 
| addinfo
| eval last30daysFlag=case(if _time>info_max_time - 30*1440, "Y") 
| eval my30dayCount=case(last30daysFlag="Y", 1) 
| eval my30dayValue=case(last30daysFlag="Y", Value) 
| eventstats sum(my30dayCount) as my30dayCount avg(my30dayValue) as my30dayValue

That can also be written more succinctly as

your search that gets all your data 
| addinfo
| stats sum(eval(case(_time>info_max_time - 30*1440,1))) as my30dayCount,
            avg(eval(case(_time>info_max_time - 30*1440,Value))) as my30dayValue

In both cases, by using eventstats, the answers for the whole search will be added to every record.

If the entire search is using a stats command, you could also build it into that instead of using eventstats.

0 Karma

richgalloway
SplunkTrust
SplunkTrust

Please describe the problem you are trying to solve. What queries have you tried?

---
If this reply helps you, Karma would be appreciated.
0 Karma
Get Updates on the Splunk Community!

Transforming Financial Data into Fraud Intelligence

Every day, banks and financial companies handle millions of transactions, logins, and customer interactions ...

How to send events & findings from AWS to Splunk using Amazon EventBridge

Amazon EventBridge is a serverless service that uses events to connect application components together, making ...

Exciting News: The AppDynamics Community Joins Splunk!

Hello Splunkers,   I’d like to introduce myself—I’m Ryan, the former AppDynamics Community Manager, and I’m ...