Splunk Search

I have to aggregate events in index by week and by month.

snigdhasaxena
Communicator

I have tried using bin command but as
index=test| bin span=1w _time | chart count as total_count by _time, action

But this gives me event count over a span of 30days for every 7 days.

Please help me understand how to aggregate events in index by week and by month.

Tags (1)
0 Karma
1 Solution

adonio
Ultra Champion

hello there,

try this out:

  index = test
    | bin _time span=1w as week
    | bin span=1mon _time as month
    | stats count as total_count by week month action
    | eval week_human = strftime(week, "%Y-%U")
    | eval month_human = strftime(month, "%Y-%B")

hope it helps

View solution in original post

woodcock
Esteemed Legend

It may be painful to do this on the raw data if you need to do this all the time, over and over. If you do, this is the kind of thing where a Summary Index is useful;

https://docs.splunk.com/Documentation/Splunk/latest/Knowledge/Configuresummaryindexes

If you aggregate daily, then it becomes trivial to mine it out by week or by month from your daily aggregation/summary.

0 Karma

adonio
Ultra Champion

hello there,

try this out:

  index = test
    | bin _time span=1w as week
    | bin span=1mon _time as month
    | stats count as total_count by week month action
    | eval week_human = strftime(week, "%Y-%U")
    | eval month_human = strftime(month, "%Y-%B")

hope it helps

Get Updates on the Splunk Community!

Stay Connected: Your Guide to May Tech Talks, Office Hours, and Webinars!

Take a look below to explore our upcoming Community Office Hours, Tech Talks, and Webinars this month. This ...

They're back! Join the SplunkTrust and MVP at .conf24

With our highly anticipated annual conference, .conf, comes the fez-wearers you can trust! The SplunkTrust, as ...

Enterprise Security Content Update (ESCU) | New Releases

Last month, the Splunk Threat Research Team had two releases of new security content via the Enterprise ...