Splunk Search

Search by time, then visualize in

moayadalghamdi
Path Finder

Hello Splunkers !

 

i want to write a command that shows a timeline of authentication activities as following:

index=MyIndex eventtype=Authentication user=* action=* src=* | stats count(user) by _time

the output looks like this:

moayadalghamdi_0-1611815046340.png

 

 

the thing is that the time is in seconds is shown is statistics below:

moayadalghamdi_2-1611815231462.pngmoayadalghamdi_3-1611815256977.png

 

 

i want the the command to show count  for authentication attempts by minutes not seconds.

 

 

 

Thanks ^_^

 

Labels (3)
0 Karma
1 Solution

bowesmana
SplunkTrust
SplunkTrust

@moayadalghamdi 

index=MyIndex eventtype=Authentication user=* action=* src=*
| bin _time span=1m
| stats count(user) by _time

OR

index=MyIndex eventtype=Authentication user=* action=* src=*
| timechart span=1m count(user)

 

View solution in original post

bowesmana
SplunkTrust
SplunkTrust

@moayadalghamdi 

index=MyIndex eventtype=Authentication user=* action=* src=*
| bin _time span=1m
| stats count(user) by _time

OR

index=MyIndex eventtype=Authentication user=* action=* src=*
| timechart span=1m count(user)

 

moayadalghamdi
Path Finder

AWESOME !, Thanks ^_^

0 Karma
Get Updates on the Splunk Community!

Extending Observability Content to Splunk Cloud

Watch Now!   In this Extending Observability Content to Splunk Cloud Tech Talk, you'll see how to leverage ...

More Control Over Your Monitoring Costs with Archived Metrics!

What if there was a way you could keep all the metrics data you need while saving on storage costs?This is now ...

New in Observability Cloud - Explicit Bucket Histograms

Splunk introduces native support for histograms as a metric data type within Observability Cloud with Explicit ...