Splunk Search

stats count by value, grouped by time

ryastrebov
Communicator

Hello!

I analyze DNS-log. I can get stats count by Domain:

| stats count by Domain 

And I can get list of domain per minute'

index=main3   |bucket span=1m _time | stats values(Domain) by _time

But I can't combine this two search... I would like to receive as a result of such a table:

_time     Domain        count
12:51     domain1.com    2
          domain2.com    5
          domain3.net    3
12:52     domain1.com    4
          domain2.com    2
          domain3.net    9

How I can make it?

Tags (1)
0 Karma
1 Solution

jstockamp
Communicator

timechart seems like a better solution here

timechart span=1m count(domain) by domain

should work.

View solution in original post

jstockamp
Communicator

timechart seems like a better solution here

timechart span=1m count(domain) by domain

should work.

ryastrebov
Communicator

Thank you!
Yes, It's work fine, but in result table contains only the most popular domains. As it can be modified to produce a table of all contained in the log domains?

0 Karma
Got questions? Get answers!

Join the Splunk Community Slack to learn, troubleshoot, and make connections with fellow Splunk practitioners in real time!

Meet up IRL or virtually!

Join Splunk User Groups to connect and learn in-person by region or remotely by topic or industry.

Get Updates on the Splunk Community!

Why Splunk Customers Should Attend Cisco Live 2026 Las Vegas

Why Splunk Customers Should Attend Cisco Live 2026 Las Vegas     Cisco Live 2026 is almost here, and this ...

What Is the Name of the USB Key Inserted by Bob Smith? (BOTS Hint, Not the Answer)

Hello Splunkers,   So you searched, “what is the name of the usb key inserted by bob smith?”  Not gonna lie… ...

Automating Threat Operations and Threat Hunting with Recorded Future

    Automating Threat Operations and Threat Hunting with Recorded Future June 29, 2026 | Register   Is your ...