Splunk Search

How to display and group events in a timechart that are continuous for 10 minutes?

kartik13
Communicator

Hi ,

I have a timechart with different columns. I want to display those events from a time chart which are continuous at least for 10 minutes.

alt text

I want to group the events which are marked red and yellow on based on the time or event. Help required.

0 Karma

somesoni2
Revered Legend

Give this a shot (check the field names)

your current search with timechart | streamstats current=f windows=1 values('Total Error') as prev_error values('Total Auth') as prev_auth
|  where (prev_error='Total Error' AND 'Total Error'!=0) OR (prev_auth='Total Auth' AND 'Total Auth'!=0) 
0 Karma

somesoni2
Revered Legend

Are the column names fixed in your time chart?

0 Karma

kartik13
Communicator

yes they are , these are spikes in the Total Errors and authorization and authentication failures respectively .

0 Karma
Get Updates on the Splunk Community!

Shape the Future of Splunk: Join the Product Research Lab!

Join the Splunk Product Research Lab and connect with us in the Slack channel #product-research-lab to get ...

Auto-Injector for Everything Else: Making OpenTelemetry Truly Universal

You might have seen Splunk’s recent announcement about donating the OpenTelemetry Injector to the ...

[Puzzles] Solve, Learn, Repeat: Character substitutions with Regular Expressions

This challenge was first posted on Slack #puzzles channelFor BORE at .conf23, we had a puzzle question which ...