Splunk Search

How to get results from last week's data but only if there is a new returned result from last 24h?

evallja
Path Finder

Hello everyone,

I'm trying to schedule an alert looking like this: index=network host=device1 | stats count by sourceip | where count > 2 (last 7 days).

I will schedule it daily and I want it to search the last 7 days to see if an  IP is found more than 2 times and return events like the below:

            sourceip         count

1   162.14.xxx.xxx       5
2   185.225.xxx.xxx    7
3   203.122.xxx.xxx    3
4   61.246.xxx.xxx       6

The problem is that the next day I don't want to see the same results if there is no new data from a new IP from the last 24h.
So I need to add a condition that will only allow the search to return results if a new returned result (where count > 2) is added to the results last 24h.

Do you have any suggestions?

Thank you in advance.

Labels (1)
0 Karma
1 Solution

evallja
Path Finder

Thank you for your reply @ITWhisperer , it was very helpful. I modified two little things like below and now it is working perfectly:

index=network host=device1 earliest=-7d@d latest=@d
  [ search index=network host=device1 earliest=-24h@h latest=@h
    | fields sourceip]
| stats count by sourceip 
| where count > 2

Best regards.

View solution in original post

0 Karma

ITWhisperer
SplunkTrust
SplunkTrust

Try something like this

index=network host=device1 earliest=-7d@d latest=@d
  [ index=network host=device1 earliest=-24h@h latest=@h
    | dedup sourceip
    | fields sourceip]
| stats count by sourceip 
| where count > 2

evallja
Path Finder

Thank you for your reply @ITWhisperer , it was very helpful. I modified two little things like below and now it is working perfectly:

index=network host=device1 earliest=-7d@d latest=@d
  [ search index=network host=device1 earliest=-24h@h latest=@h
    | fields sourceip]
| stats count by sourceip 
| where count > 2

Best regards.

0 Karma
Get Updates on the Splunk Community!

Continuing Innovation & New Integrations Unlock Full Stack Observability For Your ...

You’ve probably heard the latest about AppDynamics joining the Splunk Observability portfolio, deepening our ...

Monitoring Amazon Elastic Kubernetes Service (EKS)

As we’ve seen, integrating Kubernetes environments with Splunk Observability Cloud is a quick and easy way to ...

Cloud Platform & Enterprise: Classic Dashboard Export Feature Deprecation

As of Splunk Cloud Platform 9.3.2408 and Splunk Enterprise 9.4, classic dashboard export features are now ...