Splunk Search

How do I make a timechart show the times in horizontal instead of vertical?

ngoetz9915
New Member

I am trying to run a search that shows how many unique ports a particular IP address access in a day over a seven pay period

I am using the following search:

index=***** | timechart span=1d dc(dest_port) by src_ip

This seems to get me the correct information, but it would be a lot more useful if I could have the time as the header and the list of IP's going vertical. This way I could see a lot more information. The current search only shows me 10 IP addresses and groups the rest into an "OTHER" column.

Thanks

0 Karma

ugy
Explorer

You should use "useother" option.

index=* | timechart span=1d dc(dest_port) by src_ip useohter=false

OR
index=* | timechart span=1d dc(dest_port) by src_ip | sort 100

Good day!

0 Karma
Get Updates on the Splunk Community!

Splunk + ThousandEyes: Correlate frontend, app, and network data to troubleshoot ...

 Are you tired of troubleshooting delays caused by siloed frontend, application, and network data? We've got a ...

Splunk Observability for AI

Don’t miss out on an exciting Tech Talk on Splunk Observability for AI!Discover how Splunk’s agentic AI ...

🔐 Trust at Every Hop: How mTLS in Splunk Enterprise 10.0 Makes Security Simpler

From Idea to Implementation: Why Splunk Built mTLS into Splunk Enterprise 10.0  mTLS wasn’t just a checkbox ...