Splunk Search

Timechart to filter inactive buckets

muralianup
Communicator

I need help with time chat query. Basically I want to display all the graph occurrences where the count hit 0 and stayed like that.

base search | timechart count by URL limit=100

That's where I am and there are some URL hits which were active at certain time then count was 0. I am searching through more than 1 URL and only want those whose count was zero after specific time.
alt text

0 Karma

renjith_nair
Legend

Hi @muralianup,

Try this

base search | timechart count by URL limit=100|untable _time URL count|where (count = 0 AND _time<your_time_filter)
---
What goes around comes around. If it helps, hit it with Karma 🙂
0 Karma

renjith_nair
Legend

Hi @muralianup,

Did this work for you?

---
What goes around comes around. If it helps, hit it with Karma 🙂
0 Karma
Get Updates on the Splunk Community!

Index This | Forward, I’m heavy; backward, I’m not. What am I?

April 2024 Edition Hayyy Splunk Education Enthusiasts and the Eternally Curious!  We’re back with another ...

A Guide To Cloud Migration Success

As enterprises’ rapid expansion to the cloud continues, IT leaders are continuously looking for ways to focus ...

Join Us for Splunk University and Get Your Bootcamp Game On!

If you know, you know! Splunk University is the vibe this summer so register today for bootcamps galore ...