Splunk Search

limit results by 10 events per day in one month timeframe

Isaias_Garcia
Path Finder

Hi-
I have this search query:
"source="/prod/splunkforwarder/bin/scripts/jrexpiry.sh" npw.gov.se"
and my time frame is from April 1- April 30. The result it gets is 5,540 events. What I want is to just limit the results to 10 events per day in 1 month that is, on April 1st,it should only give 10 events, in Apr 2nd 10 events,in Apr 3rd 10 events and so on. How can I do this?Please advise. Cheers! Isaias

Tags (3)
0 Karma

mcmaster
Communicator

Try adding "| streamstats count by date_mday | where count <= 10" to your search. For example:

source="/prod/splunkforwarder/bin/scripts/jrexpiry.sh" npw.gov.se | streamstats count by date_mday | where count <= 10
0 Karma
Get Updates on the Splunk Community!

.conf25 Registration is OPEN!

Ready. Set. Splunk! Your favorite Splunk user event is back and better than ever. Get ready for more technical ...

Detecting Cross-Channel Fraud with Splunk

This article is the final installment in our three-part series exploring fraud detection techniques using ...

Splunk at Cisco Live 2025: Learning, Innovation, and a Little Bit of Mr. Brightside

Pack your bags (and maybe your dancing shoes)—Cisco Live is heading to San Diego, June 8–12, 2025, and Splunk ...