Splunk Search

Need help formatting query output as needed

dhlevine
New Member

I have a set of mail logs and I need to generate output that shows daily counts of specific from or to addresses. This is what I'm using at the moment:

source="..." earliest="mm/dd/yyyy" latest="mm/dd/yyyy" from="@targetdomain" OR to="@targetdomain" | timechart span=1d count(from) AS dc(from) by from

This generates output of the form:

_time targetaddress1 targetaddress2 targetaddress3 ...
yyyy-mm-01 4 3 7
yyyy-mm-02 6 5 8

The format that I need to have is this:

_time address count
yyyy-mm-01 targetaddress1 4
yyyy-mm-01 targetaddress2 3
yyyy-mm-01 targetaddress3 7
yyyy-mm-02 targetaddress1 6
yyyy-mm-02 targetaddress2 5
yyyy-mm-02 targetaddress3 8

I'm fairly sure that there is a combination of timechart and/or table and/or some other feature that will allow me to do this but I'm a newbie to Splunk and I have some time constraints.

Any help would be appreciated.

Thanks!

Tags (1)
0 Karma
1 Solution

Arun_N_007
Communicator

Hi,

Why dont you use only stats.

First extract day from _time.

...|stats count by day,from|rename from as address

View solution in original post

0 Karma

Arun_N_007
Communicator

Hi,

Why dont you use only stats.

First extract day from _time.

...|stats count by day,from|rename from as address

0 Karma

dhlevine
New Member

Thank you! Adding a convert for the date in front resolved this question. Much appreciated!

0 Karma
Get Updates on the Splunk Community!

Stay Connected: Your Guide to May Tech Talks, Office Hours, and Webinars!

Take a look below to explore our upcoming Community Office Hours, Tech Talks, and Webinars this month. This ...

They're back! Join the SplunkTrust and MVP at .conf24

With our highly anticipated annual conference, .conf, comes the fez-wearers you can trust! The SplunkTrust, as ...

Enterprise Security Content Update (ESCU) | New Releases

Last month, the Splunk Threat Research Team had two releases of new security content via the Enterprise ...