Splunk Search

Newbie question - creating events vs time

kam_emea
Engager

Hi

New to Splunk and learning how to create a simple dashboard. What I'd like to see is status=403 or status=200 over time

So i've created this search here:

index=main sourcetype="access_combined_wcookie" status=403 OR status=200 | timechart span=1h count 

Then I hit visualise.

Question is, how do I differentiate between 403 and 200, they seem to be amalgamated. Is there a way to colour code them differently?

 

Labels (1)
0 Karma

ITWhisperer
SplunkTrust
SplunkTrust
index=main sourcetype="access_combined_wcookie" status=403 OR status=200 | timechart span=1h count by status
0 Karma
Get Updates on the Splunk Community!

Upcoming Webinar: Unmasking Insider Threats with Slunk Enterprise Security’s UEBA

Join us on Wed, Dec 10. at 10AM PST / 1PM EST for a live webinar and demo with Splunk experts! Discover how ...

.conf25 technical session recap of Observability for Gen AI: Monitoring LLM ...

If you’re unfamiliar, .conf is Splunk’s premier event where the Splunk community, customers, partners, and ...

A Season of Skills: New Splunk Courses to Light Up Your Learning Journey

There’s something special about this time of year—maybe it’s the glow of the holidays, maybe it’s the ...