Splunk Search

Finding events for users that have not been seen in the last X days

Liran
Observer

I need to create a baseline for what is common in an environment before creating a rule.

The rule can be as simple as:

 

search index=x sourcetype=y NOT [search index=x sourcetype=y earliest=-14d  |  table user]

 

The issue is doing an historical search using a simple search. I've looked a few commands including transaction and streamstats but did not manage to find a way to run this search recursively. 

The basic idea is to find a rare value on a specific field that is only seen less than a set threshold (e.g. 10 events) during a 14 days windows.

Labels (1)
Tags (1)
0 Karma

gcusello
SplunkTrust
SplunkTrust

Hi @Liran ,

please trey something like this:

index=x sourcetype=y
| eval period=if(_time>now()-864000,"last","previous")
| stats count BY period
| search period="last" count<10

in this way you tag the  events in two categories: "last" (Last 10 days) and "previous".

Then you have events if in the last period there are less than a threshold (10 events).

ciao.

Giuseppe

0 Karma

ITWhisperer
SplunkTrust
SplunkTrust

Not sure what the question is here - please can you clarify / expand?

0 Karma
Get Updates on the Splunk Community!

Index This | Why did the turkey cross the road?

November 2025 Edition  Hayyy Splunk Education Enthusiasts and the Eternally Curious!   We’re back with this ...

Enter the Agentic Era with Splunk AI Assistant for SPL 1.4

  &#x1f680; Your data just got a serious AI upgrade — are you ready? Say hello to the Agentic Era with the ...

Feel the Splunk Love: Real Stories from Real Customers

Hello Splunk Community,    What’s the best part of hearing how our customers use Splunk? Easy: the positive ...