Splunk Search

Timechart to filter inactive buckets

muralianup
Communicator

I need help with time chat query. Basically I want to display all the graph occurrences where the count hit 0 and stayed like that.

base search | timechart count by URL limit=100

That's where I am and there are some URL hits which were active at certain time then count was 0. I am searching through more than 1 URL and only want those whose count was zero after specific time.
alt text

0 Karma

renjith_nair
Legend

Hi @muralianup,

Try this

base search | timechart count by URL limit=100|untable _time URL count|where (count = 0 AND _time<your_time_filter)
---
What goes around comes around. If it helps, hit it with Karma 🙂
0 Karma

renjith_nair
Legend

Hi @muralianup,

Did this work for you?

---
What goes around comes around. If it helps, hit it with Karma 🙂
0 Karma
Get Updates on the Splunk Community!

Accelerating Observability as Code with the Splunk AI Assistant

We’ve seen in previous posts what Observability as Code (OaC) is and how it’s now essential for managing ...

Integrating Splunk Search API and Quarto to Create Reproducible Investigation ...

 Splunk is More Than Just the Web Console For Digital Forensics and Incident Response (DFIR) practitioners, ...

Congratulations to the 2025-2026 SplunkTrust!

Hello, Splunk Community! We are beyond thrilled to announce our newest group of SplunkTrust members!  The ...