Splunk Search

Stats function per IP over time

twistedsixty4
Path Finder

hey all,
I'm trying to grab stats on firewall denied IPs per minute over a time frame (adjustable but standard at 15m). the idea is to get a simple table of min max avg stdev (of denies per ip) per minute i can successfully do it with a timechart function, but it lump IPs together into NULL and 'other' groups after the first 10 or so records which breaks the purpose. here is what i've got..

(index=cisco* OR index=f5 OR index=app) linecount="1" | search action="blocked" | bucket _time span=1m | stats min(count), max(count), avg(count), stdev(count) by _time

can anyone help?
thanks

Tags (3)
0 Karma

carmackd
Communicator

You could set 0 limit on series for timechart

limit
Syntax: limit=
Description: Specify a limit for series filtering; limit=0 means no filtering. By default, setting limit=N would filter the top N values based on the sum of each series.

but if you're aggregating over many, horizontal scrolling becomes an issue 🙂

0 Karma
Get Updates on the Splunk Community!

Webinar Recap | Revolutionizing IT Operations: The Transformative Power of AI and ML ...

The Transformative Power of AI and ML in Enhancing Observability   In the realm of IT operations, the ...

.conf24 | Registration Open!

Hello, hello! I come bearing good news: Registration for .conf24 is now open!   conf is Splunk’s rad annual ...

ICYMI - Check out the latest releases of Splunk Edge Processor

Splunk is pleased to announce the latest enhancements to Splunk Edge Processor.  HEC Receiver authorization ...