Splunk Search

Search in logs if value appeared before?

suspense
Explorer

Hello, Good Day!

I have mail logs and I need to check if sender appeared before in last 30 days.

I have issues with write SPL with join or subsearch.

index=* sourcetype=maillogs


field that I want to compare is sender. If sender appeared in last 30 mails, then I have match and I should see those events in stats or table.
I tried subsearch but after all attempts I ended with nothing. Could you please help me?

Labels (2)
0 Karma

suspense
Explorer

Thanks. What I need is to search within logs last 24 hrs and check if sender which appeared in such logs appared before within last 30 days (but without the latest 5 days)

index=* sourcetype=maillogs
| eventstats count by sender
| where count > 1 
| rest of my SPL

Where to put earliest=-30d@d latest=-5d@d ? 

0 Karma

ITWhisperer
SplunkTrust
SplunkTrust

Try something like this

index=* sourcetype=maillogs (earliest=-30d@d latest=-5d@d) OR (earliest=-24h)
| eventstats earliest(_time) as earliest_time latest(_time) as latest_time by sender
| where earliest_time < relative_time(now(),"-24h") AND latest_time >= relative_time(now(),"-24h")
0 Karma

ITWhisperer
SplunkTrust
SplunkTrust
| eventstats count by sender
| where count > 1
0 Karma
Get Updates on the Splunk Community!

Index This | Why did the turkey cross the road?

November 2025 Edition  Hayyy Splunk Education Enthusiasts and the Eternally Curious!   We’re back with this ...

Enter the Agentic Era with Splunk AI Assistant for SPL 1.4

  &#x1f680; Your data just got a serious AI upgrade — are you ready? Say hello to the Agentic Era with the ...

Feel the Splunk Love: Real Stories from Real Customers

Hello Splunk Community,    What’s the best part of hearing how our customers use Splunk? Easy: the positive ...