Splunk Search

time frame calculation

sarit_s
Communicator

Hello
i want to write IF statement as part of my query and want it to run on time frame of 30 days or more...
the query itself runs on time frame of "all time" but the result i want is from 30 days or more

how can i do it ?

thanks

0 Karma

DalJeanis
Legend

let's suppose you want a count and average Value of all the records that match some criteria in the 30 days prior to the end of a report. You can do something like this:

your search that gets all your data 
| addinfo
| eval last30daysFlag=case(if _time>info_max_time - 30*1440, "Y") 
| eval my30dayCount=case(last30daysFlag="Y", 1) 
| eval my30dayValue=case(last30daysFlag="Y", Value) 
| eventstats sum(my30dayCount) as my30dayCount avg(my30dayValue) as my30dayValue

That can also be written more succinctly as

your search that gets all your data 
| addinfo
| stats sum(eval(case(_time>info_max_time - 30*1440,1))) as my30dayCount,
            avg(eval(case(_time>info_max_time - 30*1440,Value))) as my30dayValue

In both cases, by using eventstats, the answers for the whole search will be added to every record.

If the entire search is using a stats command, you could also build it into that instead of using eventstats.

0 Karma

richgalloway
SplunkTrust
SplunkTrust

Please describe the problem you are trying to solve. What queries have you tried?

---
If this reply helps you, Karma would be appreciated.
0 Karma
Get Updates on the Splunk Community!

Finding Based Detections General Availability

Overview  We’ve come a long way, folks, but here in Enterprise Security 8.4 I’m happy to announce Finding ...

Get Your Hands Dirty (and Your Shoes Comfy): The Splunk Experience

Hands-On Learning and Technical Seminars  Sometimes, you just need to see the code. For those looking for a ...

What’s New in Splunk Observability Cloud: January Feature Highlights & Deep Dives

Splunk Observability Cloud continues to evolve, empowering engineering and operations teams with advanced ...