Hi, I am stuck at a query problem. So what i need to do is join 2 events and get the hourly stats and peak hour successful login attempts. The sample events are - 2020-09-07 23:59:59,641 trackingid="id:638rdchdfe7vhs" event=AUTHN_ATTEMPT subject="" ip=8.2.8.44 app= clientId=WEB protocol="" role=IdP status=inprogress attributes="" description="" responsetime=39 messagetype="Request"
2020-09-07 23:59:59,641 trackingid="id:ljsdhff76duhj" event=AUTHN_ATTEMPT subject="" ip=8.2.8.24 app= clientId=MOBAPP protocol="" role=IdP status=inprogress attributes="" description="" responsetime=39 messagetype="Request"
2020-09-07 23:59:59,641 trackingid="id:8675hbcdksjdfub" event=AUTHN_ATTEMPT subject="" ip=8.6.8.24 app= clientId=SKYAPP protocol="" role=IdP status=inprogress attributes="" description="" responsetime=39 messagetype="Request" as you can see the status right now is "inprogress" and different clientId's (WEB, MOBAPP, SKYAPP) and once customer logs in successfully the below event is logged. 2020-09-07 23:59:46,772 tid:638rdchdfe7vhs INFO [org.class.MediaCredentialValidator] in processPasswordCredential VERIFIED user=test@gmail.com found and success I want to calculate the hourly volume of successful logins from clientId=WEB The common field in the events is id which i am extracting and what is want is a table with _time and count column on hourly basis. Query - index=test (sourcetype=splunk_log event=AUTHN_ATTEMPT clientId=web status=inprogress) OR (source="server.log" "In processPasswordCredential" "found and success")
| rex field=_raw "sessionid\=\"id\:(?<id>[^\"]+)"
| stats count by tid Let me know if someone can advice on this. @richgalloway @gcusello
... View more