Splunk Search

How to graph the rate from firewall logs with only start and end session messages ?

New Member


I have a network rate graph i build from my firewall logs with the timechart command:

host=firewall_IP type=traffic | timechart sum(rcvdbyte)

It works fine, except with very long sessions: because the firewall log is not packet-based but session-based, so for those sessions i only have a huge peak at the time of the session end, instead of a continuous line from the start to the end of the session.

Is there a way to draw a chart which show a continuous rate between the session start and the end ?

The messages (events) contain : session start time, session end time, session ID (unique), duration of session (in end message), cumulative bytes (in end message).


0 Karma


Bump, have the same question.

We try to chart bytes over duration for a dedicated start time.
So the bytes have to be uniformley distributed in a time chart from start time + duration (as end time).

0 Karma
Get Updates on the Splunk Community!

Streamline Data Ingestion With Deployment Server Essentials

REGISTER NOW!Every day the list of sources Admins are responsible for gets bigger and bigger, often making the ...

Remediate Threats Faster and Simplify Investigations With Splunk Enterprise Security ...

REGISTER NOW!Join us for a Tech Talk around our latest release of Splunk Enterprise Security 7.2! We’ll walk ...

Introduction to Splunk AI

WATCH NOWHow are you using AI in Splunk? Whether you see AI as a threat or opportunity, AI is here to stay. ...