Splunk Search

mutiple search

riposans
Explorer

Hello everyone,

 i need solution for this.

my data :

userID=text123 , login_time="2024-03-21 08:04:42.201000", ip_addr=12.3.3.21

userID=text123, login_time="2024-03-21 08:00:00.001000", ip_addr=12.3.3.45

userID=text123, login_time="2024-03-21 08:02:12.201000", ip_addr=12.3.3.21

userID=text123, login_time="2024-03-21 07:02:42.201000", ip_addr=12.3.3.34

 

i want get data, userID="text123 " AND in the last 5 minutes AND if mutiple ip

i used join,map,append but not solved.please help for SPL this

Labels (1)
0 Karma

bowesmana
SplunkTrust
SplunkTrust

Try this - use your index and I assume that the event _time stamp is the login time.

index=bla userID=text123 earliest=-5m@m latest=@m
| stats dc(ip) as ips by userID
| where ips>1

If your events contain other info than just login details, then you may need to add login_time=* to the search

0 Karma
Get Updates on the Splunk Community!

Fastest way to demo Observability

I’ve been having a lot of fun learning about Kubernetes and Observability. I set myself an interesting ...

September Community Champions: A Shoutout to Our Contributors!

As we close the books on another fantastic month, we want to take a moment to celebrate the people who are the ...

Splunk Decoded: Service Maps vs Service Analyzer Tree View vs Flow Maps

It’s Monday morning, and your phone is buzzing with alert escalations – your customer-facing portal is running ...