Splunk Search

Searching where a difference in fields is greater than 1.

tslnmx
Explorer

My log messages have two fields I'd like to search on: engineElapsed and serviceElapsed. I'm interested in looking at all the records where engineElapsed - serviceElapsed > 1.

I'm new to Splunk, and have discovered I can do do something like this:

* | eval time=engineElapsed-serviceElapsed | timechart avg(time) by user

But since I need to see individual log messages, something like this might be more suited -- if it worked, that is:

eval(engineElapsed-serviceElapsed)

Help would be appreciated 🙂

Tags (1)
1 Solution

dwaddle
SplunkTrust
SplunkTrust

Have you tried this?

* | where (engineElapsed - serviceElapsed) > 1

View solution in original post

dwaddle
SplunkTrust
SplunkTrust

Have you tried this?

* | where (engineElapsed - serviceElapsed) > 1

tslnmx
Explorer

Well now I just feel silly :). All my searching, and I never found the 'where' command. Thank you!

Get Updates on the Splunk Community!

Index This | I’m short for "configuration file.” What am I?

May 2024 Edition Hayyy Splunk Education Enthusiasts and the Eternally Curious!  We’re back with a Special ...

New Articles from Academic Learning Partners, Help Expand Lantern’s Use Case Library, ...

Splunk Lantern is a Splunk customer success center that provides advice from Splunk experts on valuable data ...

Your Guide to SPL2 at .conf24!

So, you’re headed to .conf24? You’re in for a good time. Las Vegas weather is just *chef’s kiss* beautiful in ...