Splunk Search

Problems with timechart

responsys_cm
Builder

I have a saved search that runs every hour and saves a count of events into a summary index. A chart on a dashboard displays that data as follows:

index=si-security search_name="SI: Bit9 - Count of Execution Blocks (1 Hour)" | timechart count by signature bins=168

The chart is over a 7 day period. I would like the resolution of the chart to show events by hour. Whether I use bins=168 or span=7d, the chart is displaying the sum of the hourly count on a daily basis.

What am I doing wrong here?

Thx.

Craig

Tags (1)
0 Karma
1 Solution

Ayn
Legend

If you want timechart to operate on a by-hour basis, you should set span=1h.

index=si-security search_name="SI: Bit9 - Count of Execution Blocks (1 Hour)" | timechart span=1h count by signature

View solution in original post

Ayn
Legend

If you want timechart to operate on a by-hour basis, you should set span=1h.

index=si-security search_name="SI: Bit9 - Count of Execution Blocks (1 Hour)" | timechart span=1h count by signature
Get Updates on the Splunk Community!

The OpenTelemetry Certified Associate (OTCA) Exam

What’s this OTCA exam? The Linux Foundation offers the OpenTelemetry Certified Associate (OTCA) credential to ...

From Manual to Agentic: Level Up Your SOC at Cisco Live

Welcome to the Era of the Agentic SOC   Are you tired of being a manual alert responder? The security ...

Splunk Classroom Chronicles: Training Tales and Testimonials (Episode 4)

Welcome back to Splunk Classroom Chronicles, our ongoing series where we shine a light on what really happens ...