I want to know how to write search query in Splunk in order to check if the current search is greater than 20% of previous search. I am getting events on a particular count every 10 min. I want to check if my current count (for the last 10 min) is greater than 20% of my previous count(for the last 20 min). I need to use subsearch to make the comparison. But not getting result though. Can anyone help ?
Splunk command to check if current search is greater than x% of previous search
868 Views Asked by Geethu Thomas At
1
There are 1 best solutions below
Related Questions in SPLUNK
- Splunk metadata information
- Linux command outputs in splunk
- With a regular expression, match letters and numbers but not whitespaces
- break multiline events using LINE_BREAKER
- Running Python Splunk SDK Test Suite
- Incorrect Extraction of fields in Splunk
- ios crash in splunk mint
- How to search a given time range for every day in Splunk?
- Protocol(SSLV3) unsupported issue while retrieving data from Splunk
- How can you filter out direct calls to your API coming from mobile apps rather than web browsers when viewing/parsing IIS logs
- Negative regex in splunk (not using fields)
- How to get negative lookahead in regex to accept more words
- Splunk: column order of csv
- Charting multivariables in Splunk
- How to add condition in splunk data model constraint
Related Questions in SPLUNK-QUERY
- How do I create a Splunk query for unused event types?
- Splunk command to check if current search is greater than x% of previous search
- How to Build Splunk Search Query for below Scenario
- Finding brute force attacks with splunk
- i have 3 columns , total count , pass count , and fail count , how do i write formula in SQL or SPL if fail count is > 8% its development error
- Use sub-second precision on "earliest" in Splunk query
- How to write Splunk query to get first and last request time for each sources along with each source counts in a table output
- How to do compound query with where clause in Splunk?
- SPLUNK enterprise i am trying to calculate results where if > 4% of failure is anomaly?
- Searching for a particular kind of field in Splunk
- Splunk conditional distinct count
- Read Squid access.log with Splunk
- Splunk showing wrong index time
- How to extract alpha-numeric fields in a Splunk query and list them in table form
- Splunk query to extract fields from log data
Related Questions in SPLUNK-FORMULA
- Splunk command to check if current search is greater than x% of previous search
- Finding brute force attacks with splunk
- SPLUNK enterprise i am trying to calculate results where if > 4% of failure is anomaly?
- Splunk Subsearch, Using value from field in primary search used to conduct a secondary search
- Splunk - how to parse JSON ingested from Azure blob?
- Splunk : How can we get the combine result of cache and memory on splunk dashboard using splunk query
- Blank CSV in splunk report
- Setting up Splunk alerting
- Conditional statement on delta if there's a series of negative numbers
- Splunk Dashboard - difference between eval case and rangemap result
- How to do cross validation and counts between two search queries using Multisearch
- How to only extract match strings from a multi-value field and display in new column in SPLUNK Query
- To find New error in server logs that was not present in logs in the past one week
- Splunk: How to Compute Incident Duration Records?
- Splunk query reference field in joined data
Related Questions in SPLUNK-CALCULATION
- Splunk command to check if current search is greater than x% of previous search
- Finding brute force attacks with splunk
- Epoch time conversion to time in Splunk
- Splunk - how to parse JSON ingested from Azure blob?
- Blank CSV in splunk report
- Conditional statement on delta if there's a series of negative numbers
- How to do cross validation and counts between two search queries using Multisearch
- How Can I Generate A Visualisation with Multiple Data Series In Splunk
- Group events by multiple fields in Splunk
- To find New error in server logs that was not present in logs in the past one week
- Splunk: How to Compute Incident Duration Records?
- splunk check if message contains certain string
- Subsearch produced 221180 results, truncating to maxout 10000
- splunk regex issue
- How to count text that are replaced by rex commands as one in Splunk
Trending Questions
- UIImageView Frame Doesn't Reflect Constraints
- Is it possible to use adb commands to click on a view by finding its ID?
- How to create a new web character symbol recognizable by html/javascript?
- Why isn't my CSS3 animation smooth in Google Chrome (but very smooth on other browsers)?
- Heap Gives Page Fault
- Connect ffmpeg to Visual Studio 2008
- Both Object- and ValueAnimator jumps when Duration is set above API LvL 24
- How to avoid default initialization of objects in std::vector?
- second argument of the command line arguments in a format other than char** argv or char* argv[]
- How to improve efficiency of algorithm which generates next lexicographic permutation?
- Navigating to the another actvity app getting crash in android
- How to read the particular message format in android and store in sqlite database?
- Resetting inventory status after order is cancelled
- Efficiently compute powers of X in SSE/AVX
- Insert into an external database using ajax and php : POST 500 (Internal Server Error)
Popular Questions
- How do I undo the most recent local commits in Git?
- How can I remove a specific item from an array in JavaScript?
- How do I delete a Git branch locally and remotely?
- Find all files containing a specific text (string) on Linux?
- How do I revert a Git repository to a previous commit?
- How do I create an HTML button that acts like a link?
- How do I check out a remote Git branch?
- How do I force "git pull" to overwrite local files?
- How do I list all files of a directory?
- How to check whether a string contains a substring in JavaScript?
- How do I redirect to another webpage?
- How can I iterate over rows in a Pandas DataFrame?
- How do I convert a String to an int in Java?
- Does Python have a string 'contains' substring method?
- How do I check if a string contains a specific word?
I suggest saving the search results to a summary index. Then you can a separate search process the summary index looking for instances where the result is 120% of the previous result.
To save your search results to a summary index, add
| collect <summary>to your existing search.<summary>is the name of an existing index that will receive the search results.The search that will process the summary can use the
streamstatscommand to process events.