Splunk Search

How to write a search where the count of an event from the same source exceeds 2 in an hour?

shellnight
Explorer

I want to create a search query to search a specific ids event from a source to destination wherever the count of the event from the same source exceeds 2 in an hour. Please advise

Field available are

source
destination
ids event

Tags (3)
0 Karma

lguinn2
Legend

Try this

yoursearchhere
| stats count by ids source
| where count > 2

somesoni2
Revered Legend

Could you provide some example output you are looking for?

0 Karma
Get Updates on the Splunk Community!

Observe and Secure All Apps with Splunk

  Join Us for Our Next Tech Talk: Observe and Secure All Apps with SplunkAs organizations continue to innovate ...

Splunk Decoded: Business Transactions vs Business IQ

It’s the morning of Black Friday, and your e-commerce site is handling 10x normal traffic. Orders are flowing, ...

Fastest way to demo Observability

I’ve been having a lot of fun learning about Kubernetes and Observability. I set myself an interesting ...