Splunk Search

How to display and group events in a timechart that are continuous for 10 minutes?

kartik13
Communicator

Hi ,

I have a timechart with different columns. I want to display those events from a time chart which are continuous at least for 10 minutes.

alt text

I want to group the events which are marked red and yellow on based on the time or event. Help required.

0 Karma

somesoni2
Revered Legend

Give this a shot (check the field names)

your current search with timechart | streamstats current=f windows=1 values('Total Error') as prev_error values('Total Auth') as prev_auth
|  where (prev_error='Total Error' AND 'Total Error'!=0) OR (prev_auth='Total Auth' AND 'Total Auth'!=0) 
0 Karma

somesoni2
Revered Legend

Are the column names fixed in your time chart?

0 Karma

kartik13
Communicator

yes they are , these are spikes in the Total Errors and authorization and authentication failures respectively .

0 Karma
Get Updates on the Splunk Community!

OpenTelemetry for Legacy Apps? Yes, You Can!

This article is a follow-up to my previous article posted on the OpenTelemetry Blog, "Your Critical Legacy App ...

UCC Framework: Discover Developer Toolkit for Building Technology Add-ons

The Next-Gen Toolkit for Splunk Technology Add-on Development The Universal Configuration Console (UCC) ...

.conf25 Community Recap

Hello Splunkers, And just like that, .conf25 is in the books! What an incredible few days — full of learning, ...