Dashboards & Visualizations

How to aggregate data by hour across multiple days

Simon1817
Engager

I am looking at event data.  I can group the data by hour like this:

index=wineventlog EventCode=4740 Caller_Computer_Name=SERVER14 Account_Locked_Out_Name=USER12 | TIMECHART SPAN=1h count BY Caller_Computer_Name

but that gives me an hour for each day, so hundreds of rows.

I want 24 rows.  i.e. I want all events that occur between Midnight and 1am, on any day, in the first row; and then all events between 1am and 2am, on any day, in the second row; and so on.

I've 

Labels (1)
0 Karma
1 Solution

gcusello
SplunkTrust
SplunkTrust

Hi @Simon1817,

let me understand: you want the sum of the values of each hour of many days, is it correct?

if this is your need, please try something like this:

index=wineventlog EventCode=4740 Caller_Computer_Name=SERVER14 Account_Locked_Out_Name=USER12 
| eval hour=strftime(_time,"%H")
| chart count OVER hour BY Caller_Computer_Name

Ciao.

Giuseppe

View solution in original post

Simon1817
Engager

Exactly that, thank you.

0 Karma

gcusello
SplunkTrust
SplunkTrust

Hi @Simon1817,

let me understand: you want the sum of the values of each hour of many days, is it correct?

if this is your need, please try something like this:

index=wineventlog EventCode=4740 Caller_Computer_Name=SERVER14 Account_Locked_Out_Name=USER12 
| eval hour=strftime(_time,"%H")
| chart count OVER hour BY Caller_Computer_Name

Ciao.

Giuseppe

Get Updates on the Splunk Community!

Splunk Decoded: Service Maps vs Service Analyzer Tree View vs Flow Maps

It’s Monday morning, and your phone is buzzing with alert escalations – your customer-facing portal is running ...

What’s New in Splunk Observability – September 2025

What's NewWe are excited to announce the latest enhancements to Splunk Observability, designed to help ITOps ...

Fun with Regular Expression - multiples of nine

Fun with Regular Expression - multiples of nineThis challenge was first posted on Slack #regex channel ...