Splunk Search

How to display and group events in a timechart that are continuous for 10 minutes?

kartik13
Communicator

Hi ,

I have a timechart with different columns. I want to display those events from a time chart which are continuous at least for 10 minutes.

alt text

I want to group the events which are marked red and yellow on based on the time or event. Help required.

0 Karma

somesoni2
Revered Legend

Give this a shot (check the field names)

your current search with timechart | streamstats current=f windows=1 values('Total Error') as prev_error values('Total Auth') as prev_auth
|  where (prev_error='Total Error' AND 'Total Error'!=0) OR (prev_auth='Total Auth' AND 'Total Auth'!=0) 
0 Karma

somesoni2
Revered Legend

Are the column names fixed in your time chart?

0 Karma

kartik13
Communicator

yes they are , these are spikes in the Total Errors and authorization and authentication failures respectively .

0 Karma
Get Updates on the Splunk Community!

Community Content Calendar, November Edition

Welcome to the November edition of our Community Spotlight! Each month, we dive into the Splunk Community to ...

October Community Champions: A Shoutout to Our Contributors!

As October comes to a close, we want to take a moment to celebrate the people who make the Splunk Community ...

Stay Connected: Your Guide to November Tech Talks, Office Hours, and Webinars!

What are Community Office Hours? Community Office Hours is an interactive 60-minute Zoom series where ...