Splunk Search

How do I use date_mday to create a table with multiple fields?

jnames10
Explorer

Hi Splunkers, newish user here...
I'm looking at firewall logs, I want to create a table with number of blocked IP for each day, a cumulative daily average, number of daily block events, average events.

I thought this (which works with a single pair of stats/streamstats lines) would work:

index=phase1 action=block tag=site1

| stats dc(src) as dailyip by date_mday
| streamstats avg(dailyip) as ip_average

| stats count as dailyevt by date_mday
| streamstats avg(dailyevt) as evt_average

| table date_mday, ip_average, dailyip, dailyevt, evt_average

and create a table like this....

date_mday   ip_average  dailyip dailyevt    evt_average
4           3082            3082
5           3439            3260.5
6           3578            3366.33
7           4210            3577.25
8           2545            3370.8

But it doesnt work.... It looks like I cannot use date_mday across 2 strings like that?

Can someone give me some hints (or a solution!!)?

Many thanks.

1 Solution

richgalloway
SplunkTrust
SplunkTrust

It's not date_mday that's throwing you off, it's stats. The second stats command is counting the number of results returned by the first stats command. On top of that, there's no time information returned by stats so there's nothing to use to calculate date_mday.

The good news is you can combine the stats commands. Try this:

index=phase1 action=block tag=site1
| stats dc(src) as dailyip count as dailyevt by date_mday
| streamstats avg(dailyip) as ip_average avg(dailyevt) as evt_average
| table date_mday, ip_average, dailyip, dailyevt, evt_average
---
If this reply helps you, Karma would be appreciated.

View solution in original post

richgalloway
SplunkTrust
SplunkTrust

It's not date_mday that's throwing you off, it's stats. The second stats command is counting the number of results returned by the first stats command. On top of that, there's no time information returned by stats so there's nothing to use to calculate date_mday.

The good news is you can combine the stats commands. Try this:

index=phase1 action=block tag=site1
| stats dc(src) as dailyip count as dailyevt by date_mday
| streamstats avg(dailyip) as ip_average avg(dailyevt) as evt_average
| table date_mday, ip_average, dailyip, dailyevt, evt_average
---
If this reply helps you, Karma would be appreciated.

jnames10
Explorer

Brilliant thank you - clearly a newbie question! Didn't think to combine them. Thanks again.

0 Karma
Get Updates on the Splunk Community!

Developer Spotlight with Paul Stout

Welcome to our very first developer spotlight release series where we'll feature some awesome Splunk ...

State of Splunk Careers 2024: Maximizing Career Outcomes and the Continued Value of ...

For the past four years, Splunk has partnered with Enterprise Strategy Group to conduct a survey that gauges ...

Data-Driven Success: Splunk & Financial Services

Splunk streamlines the process of extracting insights from large volumes of data. In this fast-paced world, ...