Splunk Search

Group Daily login counts of IP by IP for a 7 day period

pparkerntx99
Explorer

I am attempting to get the LoginCount of REQUESTING_IP grouping the REQUESTING_IP's together over a 7 day period

index="login_data" sourcetype="Login_Data"[search index="hrxref_data" sourcetype="HR_XREF" John, Doe | table SignonID ] | bucket _time span=1d | stats count as LoginCount by _time REQUESTING_IP

Currently I get
Day1 REQUESTING_IP_1 LoginCount
Day1 REQUESTING_IP_2 LoginCount
Day1 REQUESTING_IP_3 LoginCount
Day2 REQUESTING_IP_1 LoginCount
Day2 REQUESTING_IP_2 LoginCount
Day2 REQUESTING_IP_3 LoginCount

The results I'm trying to get is
Day1 REQUESTING_IP_1 LoginCount
Day2 REQUESTING_IP_1 LoginCount
Day3 REQUESTING_IP_1 LoginCount
Day1 REQUESTING_IP_2 LoginCount
Day2 REQUESTING_IP_2 LoginCount
Day3 REQUESTING_IP_3 LoginCount

Your help would be greatly appreciated

Tags (4)
0 Karma

Ayn
Legend

Add "| sort REQUESTING_IP" at the end.

0 Karma

Ayn
Legend

np. Could you please mark my answer as accepted? Thanks.

0 Karma

pparkerntx99
Explorer

That worked like a charm, thanks alot

0 Karma
Get Updates on the Splunk Community!

Detecting Remote Code Executions With the Splunk Threat Research Team

REGISTER NOWRemote code execution (RCE) vulnerabilities pose a significant risk to organizations. If ...

Observability | Use Synthetic Monitoring for Website Metadata Verification

If you are on Splunk Observability Cloud, you may already have Synthetic Monitoringin your observability ...

More Ways To Control Your Costs With Archived Metrics | Register for Tech Talk

Tuesday, May 14, 2024  |  11AM PT / 2PM ET Register to Attend Join us for this Tech Talk and learn how to ...