Splunk Search

How to search for any source IP addresses that have more than one result and sourcetype within a 5 minute period?

502087470
New Member

I'm trying to run a search on search results. The first search would bring back various logs and sourcetypes. I want to take the finished search, look at any source IP addresses that have more than 1 result and more than 1 sourcetype within a 5 minute time period. Any idea's on how I might be able to do this?

0 Karma

esix_splunk
Splunk Employee
Splunk Employee

Without seeing your search results, these are all best guess...

... | bin span=5m _time |  stats count by source_ip sourcetype  _time | where count > 1

You can test this with internal logs easily :

index=_internal | stats count by sourcetype source _time | bin span=5m _time | where count > 1
Get Updates on the Splunk Community!

Introducing the Splunk Community Dashboard Challenge!

Welcome to Splunk Community Dashboard Challenge! This is your chance to showcase your skills in creating ...

Built-in Service Level Objectives Management to Bridge the Gap Between Service & ...

Wednesday, May 29, 2024  |  11AM PST / 2PM ESTRegister now and join us to learn more about how you can ...

Get Your Exclusive Splunk Certified Cybersecurity Defense Engineer Certification at ...

We’re excited to announce a new Splunk certification exam being released at .conf24! If you’re headed to Vegas ...