Splunk Search

exclude results near a match (ie exclude match AND +- 2 seconds)

spunk311z
Path Finder

I cant imagine this is possible, but splunk continuously surprises me, so ill ask:

Is there anyway to exclude results, from the same host, + or - 2 seconds from a match.
(or N seconds/minutes)

example, in this image below, id like to exclude the results above and below the match on the ip address 68.x.x.x ?
(this is just an example, i know i could get to my goal in this case by just showing IP matches, and investigating any IPs not on a known good IP lookup csv)

alt text

thanks

0 Karma

chinmoya
Communicator

You can use the bin command to group your data into your desired time-span and then do a distinct count on the ip.
Something like

index=_internal | bin _time span=5s | stats dc(clientip)

0 Karma
Get Updates on the Splunk Community!

Upcoming Webinar: Unmasking Insider Threats with Slunk Enterprise Security’s UEBA

Join us on Wed, Dec 10. at 10AM PST / 1PM EST for a live webinar and demo with Splunk experts! Discover how ...

.conf25 technical session recap of Observability for Gen AI: Monitoring LLM ...

If you’re unfamiliar, .conf is Splunk’s premier event where the Splunk community, customers, partners, and ...

A Season of Skills: New Splunk Courses to Light Up Your Learning Journey

There’s something special about this time of year—maybe it’s the glow of the holidays, maybe it’s the ...