Splunk Search

How do I make a timechart show the times in horizontal instead of vertical?

ngoetz9915
New Member

I am trying to run a search that shows how many unique ports a particular IP address access in a day over a seven pay period

I am using the following search:

index=***** | timechart span=1d dc(dest_port) by src_ip

This seems to get me the correct information, but it would be a lot more useful if I could have the time as the header and the list of IP's going vertical. This way I could see a lot more information. The current search only shows me 10 IP addresses and groups the rest into an "OTHER" column.

Thanks

0 Karma

ugy
Explorer

You should use "useother" option.

index=* | timechart span=1d dc(dest_port) by src_ip useohter=false

OR
index=* | timechart span=1d dc(dest_port) by src_ip | sort 100

Good day!

0 Karma
Career Survey
First 500 qualified respondents will receive a $20 gift card! Tell us about your professional Splunk journey.

Can’t make it to .conf25? Join us online!

Get Updates on the Splunk Community!

Level Up Your .conf25: Splunk Arcade Comes to Boston

With .conf25 right around the corner in Boston, there’s a lot to look forward to — inspiring keynotes, ...

Manual Instrumentation with Splunk Observability Cloud: How to Instrument Frontend ...

Although it might seem daunting, as we’ve seen in this series, manual instrumentation can be straightforward ...

Take Action Automatically on Splunk Alerts with Red Hat Ansible Automation Platform

Ready to make your IT operations smarter and more efficient? Discover how to automate Splunk alerts with Red ...