Splunk Search

How to look for events within a specified time period?

jwalzerpitt
Influencer

Thx to @richgalloway he provided me the way forward on returning raw events in table format after a search with eventstats:

index=foo
| dedup src 
| iplocation src 
| eventstats count by _time City src user 
| sort -count 
| stats values(City) as City, dc(City) as City_Count, values(src) as IP, sum(count) as Total by user 
| where City_Count > 3
| sort -Total

Now my question is how do I search for a specified time period, like say five minutes? This search would help me potentially find compromised accounts as I basing it on X amount of logins within Y time

Thx

0 Karma

Anantha123
Communicator

use join and give desired timeframe.

0 Karma
Get Updates on the Splunk Community!

[Puzzles] Solve, Learn, Repeat: Dynamic formatting from XML events

This challenge was first posted on Slack #puzzles channelFor a previous puzzle, I needed a set of fixed-length ...

Enter the Agentic Era with Splunk AI Assistant for SPL 1.4

  🚀 Your data just got a serious AI upgrade — are you ready? Say hello to the Agentic Era with the ...

Stronger Security with Federated Search for S3, GCP SQL & Australian Threat ...

Splunk Lantern is a Splunk customer success center that provides advice from Splunk experts on valuable data ...