Splunk Search

Group Daily login counts of IP by IP for a 7 day period

pparkerntx99
Explorer

I am attempting to get the LoginCount of REQUESTING_IP grouping the REQUESTING_IP's together over a 7 day period

index="login_data" sourcetype="Login_Data"[search index="hrxref_data" sourcetype="HR_XREF" John, Doe | table SignonID ] | bucket _time span=1d | stats count as LoginCount by _time REQUESTING_IP

Currently I get
Day1 REQUESTING_IP_1 LoginCount
Day1 REQUESTING_IP_2 LoginCount
Day1 REQUESTING_IP_3 LoginCount
Day2 REQUESTING_IP_1 LoginCount
Day2 REQUESTING_IP_2 LoginCount
Day2 REQUESTING_IP_3 LoginCount

The results I'm trying to get is
Day1 REQUESTING_IP_1 LoginCount
Day2 REQUESTING_IP_1 LoginCount
Day3 REQUESTING_IP_1 LoginCount
Day1 REQUESTING_IP_2 LoginCount
Day2 REQUESTING_IP_2 LoginCount
Day3 REQUESTING_IP_3 LoginCount

Your help would be greatly appreciated

Tags (4)
0 Karma

Ayn
Legend

Add "| sort REQUESTING_IP" at the end.

0 Karma

Ayn
Legend

np. Could you please mark my answer as accepted? Thanks.

0 Karma

pparkerntx99
Explorer

That worked like a charm, thanks alot

0 Karma
Get Updates on the Splunk Community!

Splunk Decoded: Service Maps vs Service Analyzer Tree View vs Flow Maps

It’s Monday morning, and your phone is buzzing with alert escalations – your customer-facing portal is running ...

What’s New in Splunk Observability – September 2025

What's NewWe are excited to announce the latest enhancements to Splunk Observability, designed to help ITOps ...

Fun with Regular Expression - multiples of nine

Fun with Regular Expression - multiples of nineThis challenge was first posted on Slack #regex channel ...