Splunk Search

Stats function per IP over time

twistedsixty4
Path Finder

hey all,
I'm trying to grab stats on firewall denied IPs per minute over a time frame (adjustable but standard at 15m). the idea is to get a simple table of min max avg stdev (of denies per ip) per minute i can successfully do it with a timechart function, but it lump IPs together into NULL and 'other' groups after the first 10 or so records which breaks the purpose. here is what i've got..

(index=cisco* OR index=f5 OR index=app) linecount="1" | search action="blocked" | bucket _time span=1m | stats min(count), max(count), avg(count), stdev(count) by _time

can anyone help?
thanks

Tags (3)
0 Karma

carmackd
Communicator

You could set 0 limit on series for timechart

limit
Syntax: limit=
Description: Specify a limit for series filtering; limit=0 means no filtering. By default, setting limit=N would filter the top N values based on the sum of each series.

but if you're aggregating over many, horizontal scrolling becomes an issue 🙂

0 Karma
Get Updates on the Splunk Community!

Splunk MCP & Agentic AI: Machine Data Without Limits

  Discover how the Splunk Model Context Protocol (MCP) Server can revolutionize the way your organization ...

Finding Based Detections General Availability

Overview  We’ve come a long way, folks, but here in Enterprise Security 8.4 I’m happy to announce Finding ...

Get Your Hands Dirty (and Your Shoes Comfy): The Splunk Experience

Hands-On Learning and Technical Seminars  Sometimes, you just need to see the code. For those looking for a ...