Splunk Search

timechart - Trying to bucket by 10 minutes - Displaying every minute

TheJagoff
Communicator

Hi,

I am doing the following:
index=wineventlog user="*.ad" TaskCategory="Security Group Management" |bucket _time span=10m| timechart count AS EventCount

It is showing a report line for every minute - I would like for it to have a report line for every 10 minutes and I thought that the |bucket _time span=10m would do that.

How can I get this to display results for every 10 minutes?

Thanks in advance

0 Karma
1 Solution

rjthibod
Champion

You need to put the span argument directly in the timechart command. Otherwise, it recalculates a span based on your search period.

New search to try:

index=wineventlog user="*.ad" TaskCategory="Security Group Management" | timechart span=10m count AS EventCount

View solution in original post

rjthibod
Champion

You need to put the span argument directly in the timechart command. Otherwise, it recalculates a span based on your search period.

New search to try:

index=wineventlog user="*.ad" TaskCategory="Security Group Management" | timechart span=10m count AS EventCount

Get Updates on the Splunk Community!

New Year. New Skills. New Course Releases from Splunk Education

A new year often inspires reflection—and reinvention. Whether your goals include strengthening your security ...

Splunk and TLS: It doesn't have to be too hard

Overview Creating a TLS cert for Splunk usage is pretty much standard openssl.  To make life better, use an ...

Faster Insights with AI, Streamlined Cloud-Native Operations, and More New Lantern ...

Splunk Lantern is a Splunk customer success center that provides practical guidance from Splunk experts on key ...