Splunk Search

How to look for events within a specified time period?

jwalzerpitt
Influencer

Thx to @richgalloway he provided me the way forward on returning raw events in table format after a search with eventstats:

index=foo
| dedup src 
| iplocation src 
| eventstats count by _time City src user 
| sort -count 
| stats values(City) as City, dc(City) as City_Count, values(src) as IP, sum(count) as Total by user 
| where City_Count > 3
| sort -Total

Now my question is how do I search for a specified time period, like say five minutes? This search would help me potentially find compromised accounts as I basing it on X amount of logins within Y time

Thx

0 Karma

Anantha123
Communicator

use join and give desired timeframe.

0 Karma
Get Updates on the Splunk Community!

Upcoming Webinar: Unmasking Insider Threats with Slunk Enterprise Security’s UEBA

Join us on Wed, Dec 10. at 10AM PST / 1PM EST for a live webinar and demo with Splunk experts! Discover how ...

.conf25 technical session recap of Observability for Gen AI: Monitoring LLM ...

If you’re unfamiliar, .conf is Splunk’s premier event where the Splunk community, customers, partners, and ...

A Season of Skills: New Splunk Courses to Light Up Your Learning Journey

There’s something special about this time of year—maybe it’s the glow of the holidays, maybe it’s the ...