Splunk Search

How to look for events within a specified time period?

jwalzerpitt
Influencer

Thx to @richgalloway he provided me the way forward on returning raw events in table format after a search with eventstats:

index=foo
| dedup src 
| iplocation src 
| eventstats count by _time City src user 
| sort -count 
| stats values(City) as City, dc(City) as City_Count, values(src) as IP, sum(count) as Total by user 
| where City_Count > 3
| sort -Total

Now my question is how do I search for a specified time period, like say five minutes? This search would help me potentially find compromised accounts as I basing it on X amount of logins within Y time

Thx

0 Karma

Anantha123
Communicator

use join and give desired timeframe.

0 Karma
Get Updates on the Splunk Community!

Introducing the 2024 SplunkTrust!

Hello, Splunk Community! We are beyond thrilled to announce our newest group of SplunkTrust members!  The ...

Introducing the 2024 Splunk MVPs!

We are excited to announce the 2024 cohort of the Splunk MVP program. Splunk MVPs are passionate members of ...

Splunk Custom Visualizations App End of Life

The Splunk Custom Visualizations apps End of Life for SimpleXML will reach end of support on Dec 21, 2024, ...