I have this search which works great. It makes a list for me of load times for each user, and then a total of all time (basically adding up all user times and giving me a total). This search works amazing for 24 hours time.
sourcetype=EDR user=*
| dedup LoadTime, user
| stats count by LoadTime,user,_time | fields - count
| transaction maxspan=24h
| convert dur2sec(LoadTime) AS LoadTimeSec
| eventstats sum(LoadTimeSec) as "TotalSec"
| convert timeformat="%H:%M:%S" ctime(TotalSec) AS Total_Time
| fields LoadTime, user, Total_Time
| fields - _raw, _time
However switching to say, 7 days doesn't work so good. For 7 days I would like to have a list of 7 events, and each event would contain the list of the load times for each user, the users, and the total load time.
How can I tell splunk to give me 7 days of this data separated like this? It's instead giving me a jumbled list. Would "span" work on this? So far I haven't gotten it to work.
... View more