Splunk Search

Search by time, then visualize in

moayadalghamdi
Path Finder

Hello Splunkers !

 

i want to write a command that shows a timeline of authentication activities as following:

index=MyIndex eventtype=Authentication user=* action=* src=* | stats count(user) by _time

the output looks like this:

moayadalghamdi_0-1611815046340.png

 

 

the thing is that the time is in seconds is shown is statistics below:

moayadalghamdi_2-1611815231462.pngmoayadalghamdi_3-1611815256977.png

 

 

i want the the command to show count  for authentication attempts by minutes not seconds.

 

 

 

Thanks ^_^

 

Labels (3)
0 Karma
1 Solution

bowesmana
SplunkTrust
SplunkTrust

@moayadalghamdi 

index=MyIndex eventtype=Authentication user=* action=* src=*
| bin _time span=1m
| stats count(user) by _time

OR

index=MyIndex eventtype=Authentication user=* action=* src=*
| timechart span=1m count(user)

 

View solution in original post

bowesmana
SplunkTrust
SplunkTrust

@moayadalghamdi 

index=MyIndex eventtype=Authentication user=* action=* src=*
| bin _time span=1m
| stats count(user) by _time

OR

index=MyIndex eventtype=Authentication user=* action=* src=*
| timechart span=1m count(user)

 

moayadalghamdi
Path Finder

AWESOME !, Thanks ^_^

0 Karma
Get Updates on the Splunk Community!

What the End of Support for Splunk Add-on Builder Means for You

Hello Splunk Community! We want to share an important update regarding the future of the Splunk Add-on Builder ...

Solve, Learn, Repeat: New Puzzle Channel Now Live

Welcome to the Splunk Puzzle PlaygroundIf you are anything like me, you love to solve problems, and what ...

Building Reliable Asset and Identity Frameworks in Splunk ES

 Accurate asset and identity resolution is the backbone of security operations. Without it, alerts are ...