Splunk Search

Daily Average Count from the past 7 day period

jthomasc
Loves-to-Learn

Current query,  this shows the how many successful login attempts there have been.

index=abc granttype=mobile
| fields subjectid, message | search message="*Token Success*"
| stats count

I am now looking to create a panel to show the daily average amount of successful login attempts across 7 days. Is anyone able to help me with  query please? 


 

 

Labels (1)
0 Karma

gcusello
SplunkTrust
SplunkTrust

Hi @jthomasc ,

at first, put all the search terms in the main search to have more performant searches.

then you have to use the timechart command, something like this:

index=abc granttype=mobile message="*Token Success*"
| timechart span=1d avt(count) AS avg

Ciao.

Giuseppe

0 Karma

jthomasc
Loves-to-Learn

Thanks for your speedy response and for helping me out @gcusello . Unfortunately, the average does not seem to return for this, any idea why? 

I'm essentially trying to get a Status Indicator Panel for this stat, like shown below.

 

Capture.PNGCapture1.PNG

0 Karma
Career Survey
First 500 qualified respondents will receive a $20 gift card! Tell us about your professional Splunk journey.

Can’t make it to .conf25? Join us online!

Get Updates on the Splunk Community!

Calling All Security Pros: Ready to Race Through Boston?

Hey Splunkers, .conf25 is heading to Boston and we’re kicking things off with something bold, competitive, and ...

Beyond Detection: How Splunk and Cisco Integrated Security Platforms Transform ...

Financial services organizations face an impossible equation: maintain 99.9% uptime for mission-critical ...

Customer success is front and center at .conf25

Hi Splunkers, If you are not able to be at .conf25 in person, you can still learn about all the latest news ...