Splunk Search

Group Daily login counts of IP by IP for a 7 day period

pparkerntx99
Explorer

I am attempting to get the LoginCount of REQUESTING_IP grouping the REQUESTING_IP's together over a 7 day period

index="login_data" sourcetype="Login_Data"[search index="hrxref_data" sourcetype="HR_XREF" John, Doe | table SignonID ] | bucket _time span=1d | stats count as LoginCount by _time REQUESTING_IP

Currently I get
Day1 REQUESTING_IP_1 LoginCount
Day1 REQUESTING_IP_2 LoginCount
Day1 REQUESTING_IP_3 LoginCount
Day2 REQUESTING_IP_1 LoginCount
Day2 REQUESTING_IP_2 LoginCount
Day2 REQUESTING_IP_3 LoginCount

The results I'm trying to get is
Day1 REQUESTING_IP_1 LoginCount
Day2 REQUESTING_IP_1 LoginCount
Day3 REQUESTING_IP_1 LoginCount
Day1 REQUESTING_IP_2 LoginCount
Day2 REQUESTING_IP_2 LoginCount
Day3 REQUESTING_IP_3 LoginCount

Your help would be greatly appreciated

Tags (4)
0 Karma

Ayn
Legend

Add "| sort REQUESTING_IP" at the end.

0 Karma

Ayn
Legend

np. Could you please mark my answer as accepted? Thanks.

0 Karma

pparkerntx99
Explorer

That worked like a charm, thanks alot

0 Karma
Get Updates on the Splunk Community!

What’s New & Next in Splunk SOAR

Security teams today are dealing with more alerts, more tools, and more pressure than ever.  Join us on ...

Your Voice Matters! Help Us Shape the New Splunk Lantern Experience

Splunk Lantern is a Splunk customer success center that provides advice from Splunk experts on valuable data ...

September Community Champions: A Shoutout to Our Contributors!

As we close the books on another fantastic month, we want to take a moment to celebrate the people who are the ...