Splunk Search

Increase count by 1 for every 10 Minutes

denamza
New Member

Hi All,

index="XXX" |stats latest(_time) as last_seen,values(ID) as ID, count by IP_Add | eval Filter=if(count%2==0,"Even","Odd") | search Filter="Odd" |eval hours_since=(now()-last_seen) | convert timeformat="%d-%b-%y %H:%M" ctime(last_seen) | eval readable = tostring(hours_since, "duration") | sort - last_seen | rename readable as "Running for: Days+:HH:MM:SS", last_seen as "Started",IP_Add as "IP" | table ID IP Started "Running for: Days+:HH:MM:SS" count |

How do i increase count to +1 for every let's say 10 minutes that shows on duration until the stop event is received?

Thanks!!

0 Karma

alanden_splunk
Splunk Employee
Splunk Employee

To increase count by 1 from its original value, use a counter with streamstats on a bucket of 10m:

| bucket last_seen AS last_bucket span=10m | streamstats dc(last_bucket) AS counter | eval count=count+counter
0 Karma

niketn
Legend

You would need to explain more about your use case with sample data as to what start event and end event look like. Also can you not use end epoch time - start epoch time to get duration as seconds and then divide by 600 To convert it to 10 minutes?

____________________________________________
| makeresults | eval message= "Happy Splunking!!!"
0 Karma
Career Survey
First 500 qualified respondents will receive a $20 gift card! Tell us about your professional Splunk journey.
Get Updates on the Splunk Community!

Tech Talk Recap | Mastering Threat Hunting

Mastering Threat HuntingDive into the world of threat hunting, exploring the key differences between ...

Observability for AI Applications: Troubleshooting Latency

If you’re working with proprietary company data, you’re probably going to have a locally hosted LLM or many ...

Splunk AI Assistant for SPL vs. ChatGPT: Which One is Better?

In the age of AI, every tool promises to make our lives easier. From summarizing content to writing code, ...