I have splunk queries that generates 2 different tables having similar fields (METHOD, URI, COUNT). I wanted to do a diff between them based on URI and also the count. Eg: tableA METHOD URI C...
Hi need to compare total numbers if they are different show table that present them 23:57:05.253 app module: PACK: Total:[1010000] from server1 Total:[C000001010000] 23:57:05.254 app module: P...
Hi,
My search query is like this : index=main source=file1.txt | stats values(wrk) as "Work Name", values(name) as "Name", values(folder) as "Folder Name", values(version) as "Version"|transpose |r...
Given I have multiple hosts, I'd like the host total within a bucketed time span, average of the totals across all hosts, and the percentage difference per host compared to the average. E.g.
F...
Hi I am really struggling to find the difference between the 51= time and the 59= time below and add to a separate column My log extract example is 2021-01-06 12:37:57.411 [FIDO1] INFO L...
What are the differences between option "s" and "y"?
index=_internal sourcetype=splunkd | rex mode=sed “s/idx=\d+\.\d+\.\d+\.\d+\:\d+/XX.XXX.XX.XXX:XXXX/g"
index=_internal sourcetype=s...
HI Team,
I would like to create a table in a dashboard from two difference results.
Eg: Blue stack results and Green stack results has to display on a same table like below.
Green /t...
I am very new to Splunk. I have two log files, the first one, let's call it accessLog, contains the access log for the http requests A splunk query could give me the count for each request. ...
...ount alive or dead , example a Goat (alive =2 , dead = 1) diff = alive - dead (1) , and Rabit(alive=1 , dead=1) diff = alive - dead (0), i want to create table of result
Animal | alive | dead | diff...