Splunk Search

Search in logs if value appeared before?

suspense
Explorer

Hello, Good Day!

I have mail logs and I need to check if sender appeared before in last 30 days.

I have issues with write SPL with join or subsearch.

index=* sourcetype=maillogs


field that I want to compare is sender. If sender appeared in last 30 mails, then I have match and I should see those events in stats or table.
I tried subsearch but after all attempts I ended with nothing. Could you please help me?

Labels (2)
0 Karma

suspense
Explorer

Thanks. What I need is to search within logs last 24 hrs and check if sender which appeared in such logs appared before within last 30 days (but without the latest 5 days)

index=* sourcetype=maillogs
| eventstats count by sender
| where count > 1 
| rest of my SPL

Where to put earliest=-30d@d latest=-5d@d ? 

0 Karma

ITWhisperer
SplunkTrust
SplunkTrust

Try something like this

index=* sourcetype=maillogs (earliest=-30d@d latest=-5d@d) OR (earliest=-24h)
| eventstats earliest(_time) as earliest_time latest(_time) as latest_time by sender
| where earliest_time < relative_time(now(),"-24h") AND latest_time >= relative_time(now(),"-24h")
0 Karma

ITWhisperer
SplunkTrust
SplunkTrust
| eventstats count by sender
| where count > 1
0 Karma
Career Survey
First 500 qualified respondents will receive a $20 gift card! Tell us about your professional Splunk journey.

Can’t make it to .conf25? Join us online!

Get Updates on the Splunk Community!

Take Action Automatically on Splunk Alerts with Red Hat Ansible Automation Platform

 Are you ready to revolutionize your IT operations? As digital transformation accelerates, the demand for ...

Calling All Security Pros: Ready to Race Through Boston?

Hey Splunkers, .conf25 is heading to Boston and we’re kicking things off with something bold, competitive, and ...

Beyond Detection: How Splunk and Cisco Integrated Security Platforms Transform ...

Financial services organizations face an impossible equation: maintain 99.9% uptime for mission-critical ...