Splunk Search

How to write a search to list the count of the number of times an ID appears and the timestamp it was last found?

albyva
Communicator

How can I get splunk to count the number of times an ID appears and to list the last date it was found?

Splunk Data:

Jan 19 21:35:27 score="9.3", ip=192.168.2.1, id=123, name="blahblah1"
Jan 19 21:35:28 score="1.0", ip=192.168.2.2, id=456, name="blahblah2"
Jan 19 21:35:29 score="2.5", ip=192.168.2.3, id=789, name="blahblah3"
Jan 19 21:35:30 score="9.3", ip=192.168.2.4, id=123, name="blahblah1"

What I want to see is an output that looks like:

COUNT ID   NAME      SCORE  DATE
-------------------------------------------
2     123  blahblah1  9.3   Jan 19 21:35:30    (note the last date)
1     456  blahblah2  1.0   Jan 19 21:35:28
1     789  blahblah3  2.5   Jan 19 21:35:29

What I've been doing is running:

searchstring | stats count by id name score

and that gets me most of what I need, but I can't seem to incorporate the latest Date without it screwing up everything.
Any suggestions?

Thanks,

0 Karma
1 Solution

albyva
Communicator

I figured it out.

searchstring | stats count latest(_time) as LastHit by id, name, score | convert ctime(LastHit)

View solution in original post

albyva
Communicator

I figured it out.

searchstring | stats count latest(_time) as LastHit by id, name, score | convert ctime(LastHit)

Get Updates on the Splunk Community!

Changes to Splunk Instructor-Led Training Completion Criteria

We’re excited to share an update to our instructor-led training program that enhances the learning experience ...

Stay Connected: Your Guide to January Tech Talks, Office Hours, and Webinars!

❄️ Welcome the new year with our January lineup of Community Office Hours, Tech Talks, and Webinars! 🎉 ...

Preparing your Splunk Environment for OpenSSL3

The Splunk platform will transition to OpenSSL version 3 in a future release. Actions are required to prepare ...