Splunk Search

need value by time

splunkuseradmin
Path Finder

hello I have a command which gives the value ex., "172" it is basically change when no. of ldap users added and removed I need to get the value by time. where there is no logs generated by time or some thing like that its just a total number which we can see ...
-So the question is, is there any way we can get by time like if we run a dashboard we get these fields and count by week or something.

it basically gives the fields
Host.....User........count.......port
ccm.corp.exp.com......sideview-cdr........172.......8443

Tags (1)
0 Karma

PowerPacked
Builder

Hi

are you looking timechart command, this will plot a chart for every time span.

yourquery | timechart span=1h count(yourfieldname)

change the span to others like 1m,5m,1h,1d etc

& take a look at this timechart command doc

https://docs.splunk.com/Documentation/Splunk/7.2.6/SearchReference/Timechart

Thanks

0 Karma

splunkuseradmin
Path Finder

thank you for replying but timechart command is not working as there are no logs.
basically using api's to get values.

0 Karma

PowerPacked
Builder

It should return time field other wise you cant plot chart or not even know when that specific value happened or changed

0 Karma
Get Updates on the Splunk Community!

Purpose in Action: How Splunk Is Helping Power an Inclusive Future for All

At Cisco, purpose isn’t a tagline—it’s a commitment. Cisco’s FY25 Purpose Report outlines how the company is ...

[Upcoming Webinar] Demo Day: Transforming IT Operations with Splunk

Join us for a live Demo Day at the Cisco Store on January 21st 10:00am - 11:00am PST In the fast-paced world ...

New Year. New Skills. New Course Releases from Splunk Education

A new year often inspires reflection—and reinvention. Whether your goals include strengthening your security ...