Splunk Search

Why the count of the user per hour varies after executing the same query after a inetrval of time?

srideviv
Engager

Hi All,

Input logs are forwarded from a syslog server. We extracted server name and user id from the logs. Our requirement is to find the count of users logged in a particular server per hour. So we used the below query but the result is varying at every execution. Could you please help with this issue?

| table _time, server, userdetails
| timechart span=1h dc(userdetails) by server

Thanks in advance.

0 Karma

VSIRIS
Path Finder

At every execution you timerange is getting differed, so obviously if you stick to your earliest and latest of time, then your result will be constant. You can add the below in your query and see to yourself

index=abc earliest=-2h@h latest=-1h@h
| table _time, server, userdetails
| timechart span=1h dc(userdetails) by server

0 Karma

to4kawa
Ultra Champion

Maybe your time picker will be Last ....
So at each searching, search range and the count of results are different.

0 Karma
Get Updates on the Splunk Community!

Introducing the Splunk Community Dashboard Challenge!

Welcome to Splunk Community Dashboard Challenge! This is your chance to showcase your skills in creating ...

Built-in Service Level Objectives Management to Bridge the Gap Between Service & ...

Wednesday, May 29, 2024  |  11AM PST / 2PM ESTRegister now and join us to learn more about how you can ...

Get Your Exclusive Splunk Certified Cybersecurity Defense Engineer Certification at ...

We’re excited to announce a new Splunk certification exam being released at .conf24! If you’re headed to Vegas ...