Splunk Search

Search in logs if value appeared before?

suspense
Explorer

Hello, Good Day!

I have mail logs and I need to check if sender appeared before in last 30 days.

I have issues with write SPL with join or subsearch.

index=* sourcetype=maillogs


field that I want to compare is sender. If sender appeared in last 30 mails, then I have match and I should see those events in stats or table.
I tried subsearch but after all attempts I ended with nothing. Could you please help me?

Labels (2)
0 Karma

suspense
Explorer

Thanks. What I need is to search within logs last 24 hrs and check if sender which appeared in such logs appared before within last 30 days (but without the latest 5 days)

index=* sourcetype=maillogs
| eventstats count by sender
| where count > 1 
| rest of my SPL

Where to put earliest=-30d@d latest=-5d@d ? 

0 Karma

ITWhisperer
SplunkTrust
SplunkTrust

Try something like this

index=* sourcetype=maillogs (earliest=-30d@d latest=-5d@d) OR (earliest=-24h)
| eventstats earliest(_time) as earliest_time latest(_time) as latest_time by sender
| where earliest_time < relative_time(now(),"-24h") AND latest_time >= relative_time(now(),"-24h")
0 Karma

ITWhisperer
SplunkTrust
SplunkTrust
| eventstats count by sender
| where count > 1
0 Karma
Career Survey
First 500 qualified respondents will receive a $20 gift card! Tell us about your professional Splunk journey.
Get Updates on the Splunk Community!

.conf25 Global Broadcast: Don’t Miss a Moment

Hello Splunkers, .conf25 is only a click away.  Not able to make it to .conf25 in person? No worries, you can ...

Observe and Secure All Apps with Splunk

 Join Us for Our Next Tech Talk: Observe and Secure All Apps with SplunkAs organizations continue to innovate ...

What's New in Splunk Observability - August 2025

What's New We are excited to announce the latest enhancements to Splunk Observability Cloud as well as what is ...