<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Splunk search to get count greater than 5 in 24 hour for 1 month? in Other Usage</title>
    <link>https://community.splunk.com/t5/Other-Usage/Splunk-search-to-get-count-greater-than-5-in-24-hour-for-1-month/m-p/650829#M1057</link>
    <description>&lt;P&gt;HI,&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I am looking for splunk query which gives table having count field value greater than 5 in last 24 hr.&lt;/P&gt;
&lt;P&gt;if my name log count is greater than 5 in last 24 hr for specific search condition then it should be available in table, if tomorrow again in last 24 hr log count on my name is greater than 5 then again my name should be&amp;nbsp;available in table for last two days time range.&lt;/P&gt;
&lt;P&gt;Below mentioned is query for last 24 hour.&lt;/P&gt;
&lt;P&gt;&lt;FONT color="#000000"&gt;&lt;STRONG&gt;EXTERNAL_AUTH_COMPLETE deviceType=AnixisPPCProvider AND wsModel != "Microsoft Corporation / Virtual Machine" earliest=-24h@h latest=now&lt;/STRONG&gt;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT color="#000000"&gt;&lt;STRONG&gt;| rex field=machineUserName "[A-Za-z-]+(?&amp;lt;empNo&amp;gt;\d+)"&lt;/STRONG&gt;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT color="#000000"&gt;&lt;STRONG&gt;| rex field=machineUserName "(?&amp;lt;eMail&amp;gt;.*@.*)"&lt;/STRONG&gt;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT color="#000000"&gt;&lt;STRONG&gt;| lookup WorkdayData.csv empNum AS empNo OUTPUTNEW country OCGRP OCSGRP name email&lt;/STRONG&gt;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT color="#000000"&gt;&lt;STRONG&gt;| lookup WorkdayData.csv email AS eMail OUTPUTNEW country OCGRP OCSGRP name email&lt;/STRONG&gt;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT color="#000000"&gt;&lt;STRONG&gt;| eval country = if (country == "Korea, Republic of","South Korea",country)&lt;/STRONG&gt;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT color="#000000"&gt;&lt;STRONG&gt;| eval country = if (country == "United States of America","United States",country)&lt;/STRONG&gt;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT color="#000000"&gt;&lt;STRONG&gt;| eval empType = if (like(email,"%@contractor.amat.com%"),"Contractor","RFT")&lt;/STRONG&gt;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT color="#000000"&gt;&lt;STRONG&gt;| rename OCGRP as Department OCSGRP as BusinessUnit name as Name email as Email country as Country empType as EmployeeType&lt;/STRONG&gt;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT color="#000000"&gt;&lt;STRONG&gt;| search Department = "*" AND Country="*"&lt;/STRONG&gt;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT color="#000000"&gt;&lt;STRONG&gt;| stats count by Name Email Country Department BusinessUnit EmployeeType&lt;/STRONG&gt;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT color="#000000"&gt;&lt;STRONG&gt;| where count &amp;gt; 5&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;Provide me query to get table where log count greaten than 5 on daily basis.&lt;/P&gt;
&lt;P&gt;Thanks&lt;/P&gt;
&lt;P&gt;Abhineet Kumar&lt;/P&gt;</description>
    <pubDate>Tue, 18 Jul 2023 00:49:56 GMT</pubDate>
    <dc:creator>Abhineet</dc:creator>
    <dc:date>2023-07-18T00:49:56Z</dc:date>
    <item>
      <title>Splunk search to get count greater than 5 in 24 hour for 1 month?</title>
      <link>https://community.splunk.com/t5/Other-Usage/Splunk-search-to-get-count-greater-than-5-in-24-hour-for-1-month/m-p/650829#M1057</link>
      <description>&lt;P&gt;HI,&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I am looking for splunk query which gives table having count field value greater than 5 in last 24 hr.&lt;/P&gt;
&lt;P&gt;if my name log count is greater than 5 in last 24 hr for specific search condition then it should be available in table, if tomorrow again in last 24 hr log count on my name is greater than 5 then again my name should be&amp;nbsp;available in table for last two days time range.&lt;/P&gt;
&lt;P&gt;Below mentioned is query for last 24 hour.&lt;/P&gt;
&lt;P&gt;&lt;FONT color="#000000"&gt;&lt;STRONG&gt;EXTERNAL_AUTH_COMPLETE deviceType=AnixisPPCProvider AND wsModel != "Microsoft Corporation / Virtual Machine" earliest=-24h@h latest=now&lt;/STRONG&gt;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT color="#000000"&gt;&lt;STRONG&gt;| rex field=machineUserName "[A-Za-z-]+(?&amp;lt;empNo&amp;gt;\d+)"&lt;/STRONG&gt;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT color="#000000"&gt;&lt;STRONG&gt;| rex field=machineUserName "(?&amp;lt;eMail&amp;gt;.*@.*)"&lt;/STRONG&gt;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT color="#000000"&gt;&lt;STRONG&gt;| lookup WorkdayData.csv empNum AS empNo OUTPUTNEW country OCGRP OCSGRP name email&lt;/STRONG&gt;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT color="#000000"&gt;&lt;STRONG&gt;| lookup WorkdayData.csv email AS eMail OUTPUTNEW country OCGRP OCSGRP name email&lt;/STRONG&gt;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT color="#000000"&gt;&lt;STRONG&gt;| eval country = if (country == "Korea, Republic of","South Korea",country)&lt;/STRONG&gt;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT color="#000000"&gt;&lt;STRONG&gt;| eval country = if (country == "United States of America","United States",country)&lt;/STRONG&gt;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT color="#000000"&gt;&lt;STRONG&gt;| eval empType = if (like(email,"%@contractor.amat.com%"),"Contractor","RFT")&lt;/STRONG&gt;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT color="#000000"&gt;&lt;STRONG&gt;| rename OCGRP as Department OCSGRP as BusinessUnit name as Name email as Email country as Country empType as EmployeeType&lt;/STRONG&gt;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT color="#000000"&gt;&lt;STRONG&gt;| search Department = "*" AND Country="*"&lt;/STRONG&gt;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT color="#000000"&gt;&lt;STRONG&gt;| stats count by Name Email Country Department BusinessUnit EmployeeType&lt;/STRONG&gt;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT color="#000000"&gt;&lt;STRONG&gt;| where count &amp;gt; 5&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;Provide me query to get table where log count greaten than 5 on daily basis.&lt;/P&gt;
&lt;P&gt;Thanks&lt;/P&gt;
&lt;P&gt;Abhineet Kumar&lt;/P&gt;</description>
      <pubDate>Tue, 18 Jul 2023 00:49:56 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Other-Usage/Splunk-search-to-get-count-greater-than-5-in-24-hour-for-1-month/m-p/650829#M1057</guid>
      <dc:creator>Abhineet</dc:creator>
      <dc:date>2023-07-18T00:49:56Z</dc:date>
    </item>
    <item>
      <title>Re: splunk query to get count greater than 5 in 24 hour for 1 month</title>
      <link>https://community.splunk.com/t5/Other-Usage/Splunk-search-to-get-count-greater-than-5-in-24-hour-for-1-month/m-p/650833#M1058</link>
      <description>&lt;P&gt;What do you mean by "log count greater than 5 on daily basis".&lt;/P&gt;</description>
      <pubDate>Mon, 17 Jul 2023 13:30:55 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Other-Usage/Splunk-search-to-get-count-greater-than-5-in-24-hour-for-1-month/m-p/650833#M1058</guid>
      <dc:creator>PickleRick</dc:creator>
      <dc:date>2023-07-17T13:30:55Z</dc:date>
    </item>
    <item>
      <title>Re: splunk query to get count greater than 5 in 24 hour for 1 month</title>
      <link>https://community.splunk.com/t5/Other-Usage/Splunk-search-to-get-count-greater-than-5-in-24-hour-for-1-month/m-p/650835#M1059</link>
      <description>&lt;P&gt;&lt;STRONG&gt;"log count greater than 5 on daily basis"&amp;nbsp;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;if event count greater than 5 in 24 hr duration.&lt;/P&gt;&lt;P&gt;below mentioned is sample screenshot of query mentioned in my last post for 24 hr duration.&lt;/P&gt;&lt;P&gt;[screenshot removed]&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 17 Jul 2023 15:29:12 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Other-Usage/Splunk-search-to-get-count-greater-than-5-in-24-hour-for-1-month/m-p/650835#M1059</guid>
      <dc:creator>Abhineet</dc:creator>
      <dc:date>2023-07-17T15:29:12Z</dc:date>
    </item>
    <item>
      <title>Re: splunk query to get count greater than 5 in 24 hour for 1 month</title>
      <link>https://community.splunk.com/t5/Other-Usage/Splunk-search-to-get-count-greater-than-5-in-24-hour-for-1-month/m-p/650836#M1060</link>
      <description>&lt;P&gt;I'm not sure these people would appreciate you posting their details (name/email) on the internet. Next time please anonymize the screenshot. I did remove your screenshot.&lt;/P&gt;&lt;P&gt;And the question was because it could have been interpreted twofold.&lt;/P&gt;&lt;P&gt;Either:&lt;/P&gt;&lt;P&gt;- you wanted a list of each 24-hour period during which the count was more than 5 or&lt;/P&gt;&lt;P&gt;- you wanted a list of those people for which there was a count over 5 for every 24-hour long period.&lt;/P&gt;&lt;P&gt;These are two different requirements.&lt;/P&gt;&lt;P&gt;Anyway, your search will be easiest done with&lt;/P&gt;&lt;P&gt;| bin _time span=1d&lt;/P&gt;&lt;P&gt;in the middle (before stats) and adding _time as another field in the BY clause.&lt;/P&gt;&lt;P&gt;So instead of&lt;/P&gt;&lt;PRE&gt;&lt;FONT color="#000000"&gt;| stats count by Name Email Country Department BusinessUnit EmployeeType&lt;/FONT&gt;&lt;/PRE&gt;&lt;P&gt;&lt;FONT color="#000000"&gt;you do&lt;/FONT&gt;&lt;/P&gt;&lt;PRE&gt;&lt;FONT color="#000000"&gt;| bin _time span=1d&lt;BR /&gt;| stats count by Name Email Country Department BusinessUnit EmployeeType _time&lt;/FONT&gt;&lt;/PRE&gt;&lt;P&gt;&amp;nbsp;And of course you run the search over your whole 30 days back.&lt;/P&gt;&lt;P&gt;Depending on which of the options I mentioned at the beginning you want, you might do with either your "where" command or you'd have to do some additional magic to find only those which have more than 5 over the whole month.&lt;/P&gt;</description>
      <pubDate>Mon, 17 Jul 2023 15:29:48 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Other-Usage/Splunk-search-to-get-count-greater-than-5-in-24-hour-for-1-month/m-p/650836#M1060</guid>
      <dc:creator>PickleRick</dc:creator>
      <dc:date>2023-07-17T15:29:48Z</dc:date>
    </item>
  </channel>
</rss>

