Splunk Search

Graph total events over time

chrisdev
Explorer

Hi all,

Im attempting to create a graph that plots total number of events over time. I have tried various usages of timechart, which does not have the desired effect. 

 

sourcetype=* index=* | timechart span=1h count

 

 

This yields the following result:

splunk.png

 

The total number of events in this example is 16, however the data points on the graph correspond to imports and go from 0 -> 13 -> 3. Is there any way I can plot the total number of events over time (so the 3 data point actually becomes 16)?

 

Thanks in advance for any assistance.

Labels (3)
0 Karma
1 Solution

ITWhisperer
SplunkTrust
SplunkTrust
| streamstats sum(count) as total

View solution in original post

ITWhisperer
SplunkTrust
SplunkTrust
| streamstats sum(count) as total
Get Updates on the Splunk Community!

Application management with Targeted Application Install for Victoria Experience

  Experience a new era of flexibility in managing your Splunk Cloud Platform apps! With Targeted Application ...

Index This | What goes up and never comes down?

January 2026 Edition  Hayyy Splunk Education Enthusiasts and the Eternally Curious!   We’re back with this ...

Splunkers, Pack Your Bags: Why Cisco Live EMEA is Your Next Big Destination

The Power of Two: Splunk + Cisco at "Ludicrous Scale"   You know Splunk. You know Cisco. But have you seen ...