Splunk Search

How to edit my search to count the number of requests per IP per 30 minutes?

yarafatin2
New Member

I need to get the count of requests per IP per 30 minutes.
The stats column headers should be clientip and all the 30 minute intervals - 2017-03-17 02:30:00, 2017-03-17 03:00:00, 2017-03-17 03:30:00.
The count for each of those 30 minutes interval should appear for each of the IP addresses.

I tried - host="test" sourcetype=access_log4 | bucket _time span=30m | stats count by clientip, _time
This groups the clientip and _time as unique columns. I want clientip as the only unique column and the minutes to appear dynamically as column headers.

0 Karma
1 Solution

woodcock
Esteemed Legend

Like this:

 host="test" sourcetype=access_log4 | bucket _time span=30m | chart count by clientip _time

View solution in original post

0 Karma

woodcock
Esteemed Legend

Like this:

 host="test" sourcetype=access_log4 | bucket _time span=30m | chart count by clientip _time
0 Karma
Career Survey
First 500 qualified respondents will receive a $20 gift card! Tell us about your professional Splunk journey.
Get Updates on the Splunk Community!

Tech Talk Recap | Mastering Threat Hunting

Mastering Threat HuntingDive into the world of threat hunting, exploring the key differences between ...

Observability for AI Applications: Troubleshooting Latency

If you’re working with proprietary company data, you’re probably going to have a locally hosted LLM or many ...

Splunk AI Assistant for SPL vs. ChatGPT: Which One is Better?

In the age of AI, every tool promises to make our lives easier. From summarizing content to writing code, ...