Splunk Search

How to generate a search that will display event times by sourcetype?

lasonyadj
New Member

I am trying to write a search that will return a report of event times by hour for each sourcetype.

For example,

                      Source1      Source2    Source3             Total
1/1/17 1:00PM         5000         2000       500                 7500 
1/1/17 2:00PM         4000         1000       100                 5100

Any assistance will be appreciated.

0 Karma
1 Solution

rjthibod
Champion

This is should get you started

| tstats count where index=* by sourcetype _time span=1h 
| chart sum(count) limit=0 by _time span=1h sourcetype
| addtotals fieldname=Total
| where Total > 0

View solution in original post

0 Karma

mpreddy
Communicator

try like this:

index=_internal|eventstats count by sourcetype|timechart span=1h c by sourcetype | addtotals

0 Karma

lasonyadj
New Member

Thanks! this one only gave me the database stats but its a good starting point.

0 Karma

rjthibod
Champion

This is should get you started

| tstats count where index=* by sourcetype _time span=1h 
| chart sum(count) limit=0 by _time span=1h sourcetype
| addtotals fieldname=Total
| where Total > 0
0 Karma

lasonyadj
New Member

Thanks, that seemed to do the trick!!

0 Karma
Get Updates on the Splunk Community!

Database Performance Sidebar Panel Now on APM Database Query Performance & Service ...

We’ve streamlined the troubleshooting experience for database-related service issues by adding a database ...

IM Landing Page Filter - Now Available

We’ve added the capability for you to filter across the summary details on the main Infrastructure Monitoring ...

Dynamic Links from Alerts to IM Navigators - New in Observability Cloud

Splunk continues to improve the troubleshooting experience in Observability Cloud with this latest enhancement ...