Splunk Search

Graph total events over time

chrisdev
Explorer

Hi all,

Im attempting to create a graph that plots total number of events over time. I have tried various usages of timechart, which does not have the desired effect. 

 

sourcetype=* index=* | timechart span=1h count

 

 

This yields the following result:

splunk.png

 

The total number of events in this example is 16, however the data points on the graph correspond to imports and go from 0 -> 13 -> 3. Is there any way I can plot the total number of events over time (so the 3 data point actually becomes 16)?

 

Thanks in advance for any assistance.

Labels (3)
0 Karma
1 Solution

ITWhisperer
SplunkTrust
SplunkTrust
| streamstats sum(count) as total

View solution in original post

ITWhisperer
SplunkTrust
SplunkTrust
| streamstats sum(count) as total
Get Updates on the Splunk Community!

Celebrating Fast Lane: 2025 Authorized Learning Partner of the Year

At .conf25, Splunk proudly recognized Fast Lane as the 2025 Authorized Learning Partner of the Year. This ...

Tech Talk Recap | Mastering Threat Hunting

Mastering Threat HuntingDive into the world of threat hunting, exploring the key differences between ...

Observability for AI Applications: Troubleshooting Latency

If you’re working with proprietary company data, you’re probably going to have a locally hosted LLM or many ...