Splunk Search

How can I compare sum(bytes) in two time period using sub-search?

everynameIwanti
Explorer

Hi. im new to Splunk.

I'm trying to compare the sum(bytes) for an hour ago, and the same hour one week before by certain field, and calculate the percentage change for these data. I have tried the following code, but the sum(bytes) it gives for doesn't match the actual value.

index=xxx earliest=-60m latest=now | stats sum(bytes) as current by abc | appendcols [search index=xxx earliest=-1h@h-1w latest=@h-1w  | stats sum(bytes) as before by abc] | eval diff=current-before | eval percentagediff=round(abs(diff/before)*100,0) 

The problem is that the current and the before values it returns are really off the actual value it should be at that time.
May you guys please give me some ideas or suggestions of where could this go wrong?
Thank you

Tags (2)
0 Karma

horsefez
Motivator

@everynameIwantistaken,

Try something like this with your timerange settings.

for the Subsearch do earliest=-169h@h latest=-168h@h

0 Karma

everynameIwanti
Explorer

it didn't work. I think is more like the search for the past even where out of place, like same event from last week can have 10times the sum(bytes) than the current values.

0 Karma
Get Updates on the Splunk Community!

Introducing the Splunk Community Dashboard Challenge!

Welcome to Splunk Community Dashboard Challenge! This is your chance to showcase your skills in creating ...

Get the T-shirt to Prove You Survived Splunk University Bootcamp

As if Splunk University, in Las Vegas, in-person, with three days of bootcamps and labs weren’t enough, now ...

Wondering How to Build Resiliency in the Cloud?

IT leaders are choosing Splunk Cloud as an ideal cloud transformation platform to drive business resilience,  ...