Splunk Search

Group Daily login counts of IP by IP for a 7 day period

pparkerntx99
Explorer

I am attempting to get the LoginCount of REQUESTING_IP grouping the REQUESTING_IP's together over a 7 day period

index="login_data" sourcetype="Login_Data"[search index="hrxref_data" sourcetype="HR_XREF" John, Doe | table SignonID ] | bucket _time span=1d | stats count as LoginCount by _time REQUESTING_IP

Currently I get
Day1 REQUESTING_IP_1 LoginCount
Day1 REQUESTING_IP_2 LoginCount
Day1 REQUESTING_IP_3 LoginCount
Day2 REQUESTING_IP_1 LoginCount
Day2 REQUESTING_IP_2 LoginCount
Day2 REQUESTING_IP_3 LoginCount

The results I'm trying to get is
Day1 REQUESTING_IP_1 LoginCount
Day2 REQUESTING_IP_1 LoginCount
Day3 REQUESTING_IP_1 LoginCount
Day1 REQUESTING_IP_2 LoginCount
Day2 REQUESTING_IP_2 LoginCount
Day3 REQUESTING_IP_3 LoginCount

Your help would be greatly appreciated

Tags (4)
0 Karma

Ayn
Legend

Add "| sort REQUESTING_IP" at the end.

0 Karma

Ayn
Legend

np. Could you please mark my answer as accepted? Thanks.

0 Karma

pparkerntx99
Explorer

That worked like a charm, thanks alot

0 Karma
Get Updates on the Splunk Community!

Introducing the Splunk Community Dashboard Challenge!

Welcome to Splunk Community Dashboard Challenge! This is your chance to showcase your skills in creating ...

Get the T-shirt to Prove You Survived Splunk University Bootcamp

As if Splunk University, in Las Vegas, in-person, with three days of bootcamps and labs weren’t enough, now ...

Wondering How to Build Resiliency in the Cloud?

IT leaders are choosing Splunk Cloud as an ideal cloud transformation platform to drive business resilience,  ...