Thanks in advance for the assistance, I am very new to Splunk it is a great tool but I need some assistance.
I am trying to create a filtered report with the following criteria.
- I am filtering the data down based on phishing, and now I need to grab each of the individual src_ip and count them. over a 30 day period. Unfortunately I do not know have a prelist of IP addresses based on all of the examples. My goal is to go down the list and count the number of occurrences in this list and show the report on a front panel.
Also, any good books or video training for learning how to do advanced filtering in Splunk.
Thanks
Hi @kentagous,
you can find many interesting videos in the YouTube Splunk Channel (https://www.youtube.com/@Splunkofficial).
then you can find many free courses at https://www.splunk.com/en_us/training/free-courses/overview.html
At least I hint to follow the Splunk Search Tutorial that helps you to understand how to create a search (https://docs.splunk.com/Documentation/SplunkCloud/latest/SearchTutorial/WelcometotheSearchTutorial).
About your request, it depends on the data you have (fields).
So if you have the src_ip field in your index, you could run something like this:
index=your_index sourcetype=your_sourcetype earliest=-30d@d latest=now
| stats count BY src_ip
Ciao.
Giuseppe
Assuming you already have the src_ip field already extracted correctly, you could try something like this
| stats count by src_ip