I have this search which works great.  It makes a list for me of load times for each user, and then a total of all time (basically adding up all user times and giving me a total).  This search works amazing for 24 hours time.  
  sourcetype=EDR user=* 
| dedup LoadTime, user 
| stats count by LoadTime,user,_time | fields - count 
| transaction maxspan=24h 
| convert dur2sec(LoadTime) AS LoadTimeSec 
| eventstats sum(LoadTimeSec) as "TotalSec" 
| convert timeformat="%H:%M:%S" ctime(TotalSec) AS Total_Time 
| fields LoadTime, user, Total_Time 
| fields - _raw, _time
  
 However switching to say, 7 days doesn't work so good.  For 7 days I would like to have a list of 7 events, and each event would contain the list of the load times for each user, the users, and the total load time.   
 How can I tell splunk to give me 7 days of this data separated like this?  It's instead giving me a jumbled list.  Would "span" work on this?  So far I haven't gotten it to work. 
						
					
					... View more