Splunk Search

How to display and group events in a timechart that are continuous for 10 minutes?

kartik13
Communicator

Hi ,

I have a timechart with different columns. I want to display those events from a time chart which are continuous at least for 10 minutes.

alt text

I want to group the events which are marked red and yellow on based on the time or event. Help required.

0 Karma

somesoni2
Revered Legend

Give this a shot (check the field names)

your current search with timechart | streamstats current=f windows=1 values('Total Error') as prev_error values('Total Auth') as prev_auth
|  where (prev_error='Total Error' AND 'Total Error'!=0) OR (prev_auth='Total Auth' AND 'Total Auth'!=0) 
0 Karma

somesoni2
Revered Legend

Are the column names fixed in your time chart?

0 Karma

kartik13
Communicator

yes they are , these are spikes in the Total Errors and authorization and authentication failures respectively .

0 Karma
Get Updates on the Splunk Community!

Dashboards: Hiding charts while search is being executed and other uses for tokens

There are a couple of features of SimpleXML / Classic dashboards that can be used to enhance the user ...

Splunk Observability Cloud's AI Assistant in Action Series: Explaining Metrics and ...

This is the fourth post in the Splunk Observability Cloud’s AI Assistant in Action series that digs into how ...

Brains, Bytes, and Boston: Learn from the Best at .conf25

When you think of Boston, you might picture colonial charm, world-class universities, or even the crack of a ...