Splunk Search

Consecutive events by field - only show points in time where number of such events equals 5

isvaljek
New Member

I'm trying to find points in time where a consecutive event happens 5 times in a row.
I currently have this query:

partner_id=9991| streamstats count BY timeout reset_on_change=true  | table timeout, count, _time

But it shows both timeout combinations and their increasing count.

0 Karma

woodcock
Esteemed Legend

Can't you just add | where count==5?

0 Karma

renjith_nair
Legend

@isvaljek ,

If you just want one event where number equals 5 use |where count=5

partner_id=9991| streamstats count BY timeout reset_on_change=true  | table timeout, count, _time|where count=5

If you want all the events which are contributing to the consecutive events (ie, event 1 to event 5(n)), try below

partner_id=9991|streamstats last(timeout) as prev window=1 current=f|eval flag=if(timeout==prev OR isnull(prev),0,1)
|accum flag|eventstats count by flag|where count>=5
---
What goes around comes around. If it helps, hit it with Karma 🙂
0 Karma
Get Updates on the Splunk Community!

Splunk Enterprise Security 8.x: The Essential Upgrade for Threat Detection, ...

 Prepare to elevate your security operations with the powerful upgrade to Splunk Enterprise Security 8.x! This ...

Get Early Access to AI Playbook Authoring: Apply for the Alpha Private Preview ...

Passionate about security automation? Apply now to our AI Playbook Authoring Alpha private preview ...

Reduce and Transform Your Firewall Data with Splunk Data Management

Managing high-volume firewall data has always been a challenge. Noisy events and verbose traffic logs often ...