Splunk Search

How to write a search where the count of an event from the same source exceeds 2 in an hour?

shellnight
Explorer

I want to create a search query to search a specific ids event from a source to destination wherever the count of the event from the same source exceeds 2 in an hour. Please advise

Field available are

source
destination
ids event

Tags (3)
0 Karma

lguinn2
Legend

Try this

yoursearchhere
| stats count by ids source
| where count > 2

somesoni2
Revered Legend

Could you provide some example output you are looking for?

0 Karma
Career Survey
First 500 qualified respondents will receive a $20 gift card! Tell us about your professional Splunk journey.
Get Updates on the Splunk Community!

Tech Talk Recap | Mastering Threat Hunting

Mastering Threat HuntingDive into the world of threat hunting, exploring the key differences between ...

Observability for AI Applications: Troubleshooting Latency

If you’re working with proprietary company data, you’re probably going to have a locally hosted LLM or many ...

Splunk AI Assistant for SPL vs. ChatGPT: Which One is Better?

In the age of AI, every tool promises to make our lives easier. From summarizing content to writing code, ...