Splunk Search

timechart comparing event count

mcbradford
Contributor

I want to create a time chart (line) based on the count of events for the past 24 hours, and one week earlier same day and same time period

I can create a time chart using the following:

index=myindex | timechart count

I know I can the previous week by using the following:

index=myindex earliest-7d@h latest -6d@h

How do I create a line chart using the values for the past 24 hours and the values from the previous week?

What will the search be?

Tags (2)
0 Karma

lguinn2
Legend

There is a very similar discussion at this thread:

Comparing today's data with last week's data

The technique that fpigeon uses is fine - but he ran into problems because of the volume of data. I thought it might be easier to take a look there than to run through it here.

But if you still have issues, can you give more details on the searches that you want to run?

0 Karma
Got questions? Get answers!

Join the Splunk Community Slack to learn, troubleshoot, and make connections with fellow Splunk practitioners in real time!

Meet up IRL or virtually!

Join Splunk User Groups to connect and learn in-person by region or remotely by topic or industry.

Get Updates on the Splunk Community!

Build the Future of Agentic AI: Join the Splunk Agentic Ops Hackathon

AI is changing how teams investigate incidents, detect threats, automate workflows, and build intelligent ...

[Puzzles] Solve, Learn, Repeat: Character substitutions with Regular Expressions

This challenge was first posted on Slack #puzzles channelFor BORE at .conf23, we had a puzzle question which ...

Splunk Community Badges!

  Hey everyone! Ready to earn some serious bragging rights in the community? Along with our existing badges ...