Splunk Search

timechart suppress values lower then x

ndcl
Path Finder

Hi Base,
I just run into a problem and I can´t solve it by my own. So, maybe someone here can bring me back on track:

I build a timechart of a windows sec log: …| timechart span=30m count(TaskCategory) by Accountname fine so far. Now I want to suppress all results f.e. which are less than 50 but how?
where count >50 won´t work.

Thanks!

Tags (2)
0 Karma
1 Solution

Stephen_Sorkin
Splunk Employee
Splunk Employee

This is somewhat tricky. Once the data has left timechart, the values are assigned to fields named by the values of "Accountname".

We have to preprocess the data and make sure that timechart doesn't get the undesired values to begin with.

... | bin span=30m _time
| stats count(TaskCategory) as TaskCategoryCount by _time, Accountname
| where TaskCategoryCount < 50
| timechart span=30m sum(TaskCategoryCount) as TaskCategoryCount by Accountname

View solution in original post

0 Karma

Stephen_Sorkin
Splunk Employee
Splunk Employee

This is somewhat tricky. Once the data has left timechart, the values are assigned to fields named by the values of "Accountname".

We have to preprocess the data and make sure that timechart doesn't get the undesired values to begin with.

... | bin span=30m _time
| stats count(TaskCategory) as TaskCategoryCount by _time, Accountname
| where TaskCategoryCount < 50
| timechart span=30m sum(TaskCategoryCount) as TaskCategoryCount by Accountname
0 Karma

ndcl
Path Finder

Thanks! This works fine for me!

0 Karma
Get Updates on the Splunk Community!

Index This | Why did the turkey cross the road?

November 2025 Edition  Hayyy Splunk Education Enthusiasts and the Eternally Curious!   We’re back with this ...

Enter the Agentic Era with Splunk AI Assistant for SPL 1.4

  &#x1f680; Your data just got a serious AI upgrade — are you ready? Say hello to the Agentic Era with the ...

Feel the Splunk Love: Real Stories from Real Customers

Hello Splunk Community,    What’s the best part of hearing how our customers use Splunk? Easy: the positive ...