Splunk Search

Having issues w/ timecharting basic counts.

clintla
Contributor

My base search works great for a 12 hour search

sourcetype="logs" | timechart count as eventcount by host useother = f

I've tried several variations on just getting the top couple using Top
per | top count by host

but nogo.

Would there be an easy way to say if an any hour exceeds 100 events then show the entire
12 hours for those hosts?

Even just showing where events hit over 100 for an hour for any host would be very helpful.

Tags (2)
0 Karma

sdaniels
Splunk Employee
Splunk Employee

To do the search by hour just use the bucket command.

<your search> | bucket _time span=1h | timechart count as mycount

This will give you a table with values by host greater than 100

<your search> | bucket _time span=1h | stats count as mycount by host,_time | where mycount > 100
0 Karma

clintla
Contributor

Close. My fault for not being more specific.

I'm trying to timechart out hosts that have event counts > 100.

Seems like I should be closer with the below.
| bucket _time span=1h | timechart count as mycount by host | where mycount > 100

Or is there a way to chart any host for the whole 12 hours if it gets 1 hour over 100?

| timechart per_hour(count) as mycount by host | search mycount > 100

Always an illegal search due to permissions or invalid arguement.

I'll keep tinkering- feel like Im closer- not quite there yet though.

I appreciate the help!

0 Karma
Get Updates on the Splunk Community!

Introducing the 2024 SplunkTrust!

Hello, Splunk Community! We are beyond thrilled to announce our newest group of SplunkTrust members!  The ...

Introducing the 2024 Splunk MVPs!

We are excited to announce the 2024 cohort of the Splunk MVP program. Splunk MVPs are passionate members of ...

Splunk Custom Visualizations App End of Life

The Splunk Custom Visualizations apps End of Life for SimpleXML will reach end of support on Dec 21, 2024, ...