Splunk Search

timechart comparing event count

mcbradford
Contributor

I want to create a time chart (line) based on the count of events for the past 24 hours, and one week earlier same day and same time period

I can create a time chart using the following:

index=myindex | timechart count

I know I can the previous week by using the following:

index=myindex earliest-7d@h latest -6d@h

How do I create a line chart using the values for the past 24 hours and the values from the previous week?

What will the search be?

Tags (2)
0 Karma

lguinn2
Legend

There is a very similar discussion at this thread:

Comparing today's data with last week's data

The technique that fpigeon uses is fine - but he ran into problems because of the volume of data. I thought it might be easier to take a look there than to run through it here.

But if you still have issues, can you give more details on the searches that you want to run?

0 Karma
Got questions? Get answers!

Join the Splunk Community Slack to learn, troubleshoot, and make connections with fellow Splunk practitioners in real time!

Meet up IRL or virtually!

Join Splunk User Groups to connect and learn in-person by region or remotely by topic or industry.

Get Updates on the Splunk Community!

What Is the Name of the USB Key Inserted by Bob Smith? (BOTS Hint, Not the Answer)

Hello Splunkers,   So you searched, “what is the name of the usb key inserted by bob smith?”  Not gonna lie… ...

Automating Threat Operations and Threat Hunting with Recorded Future

    Automating Threat Operations and Threat Hunting with Recorded Future June 29, 2026 | Register   Is your ...

Keep the Learning Going with the New Best of .conf Hub

Hello Splunkers, With .conf26 getting closer, there’s already a lot of excitement building around this year’s ...