Splunk Search

How to split a time period into hourly intervals?

jtest372
Explorer

 

 

 

index="dummy" url="https://www.dummy.com" status="200 OK"
| stats count by id
| where count > 10

 

 


If I apply this above query for 1 day, I would get this result, for example

 

 

id    count
ABC    50
XYZ    60

 

 

This would mean ABC called `https://www.dummy.com` 50 times in 1 day, and XYZ called that 60 times.

Now I want to check this for 1 day but with every two hours interval

Suppose, ABC called that request 25 times at 12:00 AM, and then calls it 25 times at 3:AM,
and XYZ called all the 60 requests between 12 AM and 2 AM

I want the output to look like this (time format doesn't matter)

 

 

id    count   time
XYZ    60   12:00 AM
ABC    25   12:00 AM
ABC    25   2:00 AM

 

 

Also, If I modify the query like this,  count > 30, instead of count > 10, then it should only show the XYZ field, since ABC has 25 counts for both of them.

 How do I modify my query? 


Labels (3)
Tags (1)
0 Karma
1 Solution

SanjayReddy
SplunkTrust
SplunkTrust

Hi @jtest372 

Updated Answer

How about this ?

| bin  span=2h  _time
| stats count by id _time


---
If this reply helps you, an upvote/Karma would be appreciated.

View solution in original post

SanjayReddy
SplunkTrust
SplunkTrust

Hi @jtest372 

can you please try this

| timehcart span=2h count by id

 

 

jtest372
Explorer

Thanks, Sanjay!

I tried this, but it gives me all ids as column headers like this

                        ABC       DEF       XYZ

12:00 AM               25         60         23

2:00 AM                25          0         12

4:00 AM                0          15         20

 

0 Karma

SanjayReddy
SplunkTrust
SplunkTrust

Hi @jtest372 

Updated Answer

How about this ?

| bin  span=2h  _time
| stats count by id _time


---
If this reply helps you, an upvote/Karma would be appreciated.

jtest372
Explorer

Thanks! This looks almost close, but 

bin _time span=1h is invalid

If I remove this line, it gives me the format I want but the span is not working.

0 Karma

SanjayReddy
SplunkTrust
SplunkTrust

Hi @jtest372 

may be time is not present in your data 

can you please replace _time with field which contains  contains time value

| bin <field which contains time > span=1h 

jtest372
Explorer

| bin span=2h _time
| stats count by id _time

this worked for me! I just had to place _time at the end

0 Karma

jtest372
Explorer

Placing _time at the end worked, you can edit your comment, I can accept it as the solution then! Thanks

 

0 Karma

SanjayReddy
SplunkTrust
SplunkTrust

Done Updated the Answer 

Thanks for the feedback

0 Karma
Got questions? Get answers!

Join the Splunk Community Slack to learn, troubleshoot, and make connections with fellow Splunk practitioners in real time!

Meet up IRL or virtually!

Join Splunk User Groups to connect and learn in-person by region or remotely by topic or industry.

Get Updates on the Splunk Community!

Why Splunk Customers Should Attend Cisco Live 2026 Las Vegas

Why Splunk Customers Should Attend Cisco Live 2026 Las Vegas     Cisco Live 2026 is almost here, and this ...

What Is the Name of the USB Key Inserted by Bob Smith? (BOTS Hint, Not the Answer)

Hello Splunkers,   So you searched, “what is the name of the usb key inserted by bob smith?”  Not gonna lie… ...

Automating Threat Operations and Threat Hunting with Recorded Future

    Automating Threat Operations and Threat Hunting with Recorded Future June 29, 2026 | Register   Is your ...