Splunk Search

time frame calculation

sarit_s
Communicator

Hello
i want to write IF statement as part of my query and want it to run on time frame of 30 days or more...
the query itself runs on time frame of "all time" but the result i want is from 30 days or more

how can i do it ?

thanks

0 Karma

DalJeanis
Legend

let's suppose you want a count and average Value of all the records that match some criteria in the 30 days prior to the end of a report. You can do something like this:

your search that gets all your data 
| addinfo
| eval last30daysFlag=case(if _time>info_max_time - 30*1440, "Y") 
| eval my30dayCount=case(last30daysFlag="Y", 1) 
| eval my30dayValue=case(last30daysFlag="Y", Value) 
| eventstats sum(my30dayCount) as my30dayCount avg(my30dayValue) as my30dayValue

That can also be written more succinctly as

your search that gets all your data 
| addinfo
| stats sum(eval(case(_time>info_max_time - 30*1440,1))) as my30dayCount,
            avg(eval(case(_time>info_max_time - 30*1440,Value))) as my30dayValue

In both cases, by using eventstats, the answers for the whole search will be added to every record.

If the entire search is using a stats command, you could also build it into that instead of using eventstats.

0 Karma

richgalloway
SplunkTrust
SplunkTrust

Please describe the problem you are trying to solve. What queries have you tried?

---
If this reply helps you, Karma would be appreciated.
0 Karma
Get Updates on the Splunk Community!

Extending Observability Content to Splunk Cloud

Watch Now!   In this Extending Observability Content to Splunk Cloud Tech Talk, you'll see how to leverage ...

More Control Over Your Monitoring Costs with Archived Metrics!

What if there was a way you could keep all the metrics data you need while saving on storage costs?This is now ...

New in Observability Cloud - Explicit Bucket Histograms

Splunk introduces native support for histograms as a metric data type within Observability Cloud with Explicit ...