Splunk Search

Filter values after timechart

Matthias_BY
Communicator

Hello,

i want to have a search which shows me in 10 minute span how often something did happen. i only want to display the values that are higher then 100.

how can i add this filter after my time chart report?

br
matthias

alt text

Tags (2)
0 Karma
1 Solution

lpolo
Motivator

This is a work around using stats instead of timechart:

index=oidemo sourcetype=access_combined|bucket span=10min _time|stats count by _time clientip|where count>100

It will give you the result set you need.

View solution in original post

lpolo
Motivator

This is a work around using stats instead of timechart:

index=oidemo sourcetype=access_combined|bucket span=10min _time|stats count by _time clientip|where count>100

It will give you the result set you need.

Matthias_BY
Communicator

Great! brilliant - works as expected!

0 Karma
Get Updates on the Splunk Community!

Celebrating Fast Lane: 2025 Authorized Learning Partner of the Year

At .conf25, Splunk proudly recognized Fast Lane as the 2025 Authorized Learning Partner of the Year. This ...

Tech Talk Recap | Mastering Threat Hunting

Mastering Threat HuntingDive into the world of threat hunting, exploring the key differences between ...

Observability for AI Applications: Troubleshooting Latency

If you’re working with proprietary company data, you’re probably going to have a locally hosted LLM or many ...