Splunk Search

How do I filter values with at least one zero in time?

Shark2112
Communicator

Hello!

I want to find local IPs that communicate with outside IPs every 5 minutes, for example:

                                      192.168.1.11       192.168.1.12       192.168.1.13

8.8.8.8 10:00:00 1 3 0
9.9.9.9 10:00:00 2 0 4

8.8.8.8 10:05:00 1 3 1
9.9.9.9 10:05:00 2 1 4

8.8.8.8 10:10:00 1 3 1
9.9.9.9 10:10:00 2 1 0

so i want to find:
192.168.1.11 to 8.8.8.8
192.168.1.11 to 9.9.9.9
192.168.1.12 to 8.8.8.8

i tried

| bucket span=10min _time
| stats count by int_ip ext_ip

but can't understand how to filter it

0 Karma
1 Solution

Shark2112
Communicator

done it with
|search ...... (earliest 4h)
| bucket span=10min _time
| stats count by _time int_ip ext_ip
| stats count by int_ip ext_ip
| where count=24
24 because in 4 hours 24 times of 10 minutes

View solution in original post

Shark2112
Communicator

done it with
|search ...... (earliest 4h)
| bucket span=10min _time
| stats count by _time int_ip ext_ip
| stats count by int_ip ext_ip
| where count=24
24 because in 4 hours 24 times of 10 minutes

Get Updates on the Splunk Community!

Observe and Secure All Apps with Splunk

  Join Us for Our Next Tech Talk: Observe and Secure All Apps with SplunkAs organizations continue to innovate ...

Splunk Decoded: Business Transactions vs Business IQ

It’s the morning of Black Friday, and your e-commerce site is handling 10x normal traffic. Orders are flowing, ...

Fastest way to demo Observability

I’ve been having a lot of fun learning about Kubernetes and Observability. I set myself an interesting ...