Splunk Search

timechart - Trying to bucket by 10 minutes - Displaying every minute

TheJagoff
Communicator

Hi,

I am doing the following:
index=wineventlog user="*.ad" TaskCategory="Security Group Management" |bucket _time span=10m| timechart count AS EventCount

It is showing a report line for every minute - I would like for it to have a report line for every 10 minutes and I thought that the |bucket _time span=10m would do that.

How can I get this to display results for every 10 minutes?

Thanks in advance

0 Karma
1 Solution

rjthibod
Champion

You need to put the span argument directly in the timechart command. Otherwise, it recalculates a span based on your search period.

New search to try:

index=wineventlog user="*.ad" TaskCategory="Security Group Management" | timechart span=10m count AS EventCount

View solution in original post

rjthibod
Champion

You need to put the span argument directly in the timechart command. Otherwise, it recalculates a span based on your search period.

New search to try:

index=wineventlog user="*.ad" TaskCategory="Security Group Management" | timechart span=10m count AS EventCount

Get Updates on the Splunk Community!

More Ways To Control Your Costs With Archived Metrics | Register for Tech Talk

Tuesday, May 14, 2024  |  11AM PT / 2PM ET Register to Attend Join us for this Tech Talk and learn how to ...

.conf24 | Personalize your .conf experience with Learning Paths!

Personalize your .conf24 Experience Learning paths allow you to level up your skill sets and dive deeper ...

Threat Hunting Unlocked: How to Uplevel Your Threat Hunting With the PEAK Framework ...

WATCH NOWAs AI starts tackling low level alerts, it's more critical than ever to uplevel your threat hunting ...