<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic How to create pie charts for the top 10 firewall events based on different time ranges and fields? in Splunk Search</title>
    <link>https://community.splunk.com/t5/Splunk-Search/How-to-create-pie-charts-for-the-top-10-firewall-events-based-on/m-p/152173#M42656</link>
    <description>&lt;P&gt;I'm just starting to experiment with some cool searches for my firewall events. I've created this customized search that will sort by src_ip and display other fields of interest in table form. I've used the time presets to create reports and dashboards for day, week, month and year.&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;index="main" sourcetype="syslog" | stats count by src_ip,src_port,dest_ip,dest_port,protocol,action | sort -count
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;I'm looking for help on creating some cool pie charts for top 10 events based on the aforementioned time frame's filtered by different criteria such as src_ip or action (pass/block). &lt;/P&gt;

&lt;P&gt;Much appreciated!&lt;/P&gt;</description>
    <pubDate>Mon, 06 Oct 2014 01:41:19 GMT</pubDate>
    <dc:creator>WWhite</dc:creator>
    <dc:date>2014-10-06T01:41:19Z</dc:date>
    <item>
      <title>How to create pie charts for the top 10 firewall events based on different time ranges and fields?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-create-pie-charts-for-the-top-10-firewall-events-based-on/m-p/152173#M42656</link>
      <description>&lt;P&gt;I'm just starting to experiment with some cool searches for my firewall events. I've created this customized search that will sort by src_ip and display other fields of interest in table form. I've used the time presets to create reports and dashboards for day, week, month and year.&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;index="main" sourcetype="syslog" | stats count by src_ip,src_port,dest_ip,dest_port,protocol,action | sort -count
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;I'm looking for help on creating some cool pie charts for top 10 events based on the aforementioned time frame's filtered by different criteria such as src_ip or action (pass/block). &lt;/P&gt;

&lt;P&gt;Much appreciated!&lt;/P&gt;</description>
      <pubDate>Mon, 06 Oct 2014 01:41:19 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-create-pie-charts-for-the-top-10-firewall-events-based-on/m-p/152173#M42656</guid>
      <dc:creator>WWhite</dc:creator>
      <dc:date>2014-10-06T01:41:19Z</dc:date>
    </item>
    <item>
      <title>Re: How to create pie charts for the top 10 firewall events based on different time ranges and fields?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-create-pie-charts-for-the-top-10-firewall-events-based-on/m-p/152174#M42657</link>
      <description>&lt;P&gt;OK&lt;BR /&gt;
If you are already able to make a search as you did, Producing a pie chart will be easy.&lt;/P&gt;

&lt;P&gt;just make sur that you filter your search as you like and at the end to have the top 10 you add this:&lt;/P&gt;

&lt;P&gt;&lt;STRONG&gt;| top limit=10 action&lt;/STRONG&gt;  &lt;/P&gt;

&lt;P&gt;if you are in the splunk default search view , clic on visualization then choose pie in the dropdown menu beside format. &lt;/P&gt;</description>
      <pubDate>Fri, 12 Dec 2014 13:00:41 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-create-pie-charts-for-the-top-10-firewall-events-based-on/m-p/152174#M42657</guid>
      <dc:creator>stephane_cyrill</dc:creator>
      <dc:date>2014-12-12T13:00:41Z</dc:date>
    </item>
    <item>
      <title>Re: How to create pie charts for the top 10 firewall events based on different time ranges and fields?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-create-pie-charts-for-the-top-10-firewall-events-based-on/m-p/152175#M42658</link>
      <description>&lt;P&gt;for the search you did you can have a pie&lt;/P&gt;

&lt;P&gt;index="main" sourcetype="syslog" | stats count by src_ip,src_port,dest_ip,dest_port,protocol,action | sort -count|top 10  &lt;/P&gt;

&lt;P&gt;the general syntaxe of the top commande is:  &lt;STRONG&gt;top   top-option   fiel-list  [by-clause]&lt;/STRONG&gt; &lt;/P&gt;

&lt;P&gt;see Splunk Enterprise 6x  Search Reference for more on the command.&lt;/P&gt;</description>
      <pubDate>Mon, 28 Sep 2020 18:21:57 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-create-pie-charts-for-the-top-10-firewall-events-based-on/m-p/152175#M42658</guid>
      <dc:creator>stephane_cyrill</dc:creator>
      <dc:date>2020-09-28T18:21:57Z</dc:date>
    </item>
  </channel>
</rss>

