Hi @dyapasrikanth I wish this can be done better, however date_hour i understood its not being extracted by Splunk from _time but actually its from original event FYI. About default fields (host, source, sourcetype, and more) - Splunk Documentation Following should work, extracted hour from _time. you would find events upto 17:59 as time_hour = 17, you need to further change this condition using time_min index=abc "userId:"
| eval time_hour=strftime(_time, "%H") , time_min=strftime(_time, "%M")
| where time_hour >=9 AND time_hour<=17
| rex field=message "userId: (?<customerId>.*)"
| timechart span=1h dc(customerId) as "Unique customer count" --- An upvote would be appreciated if it helps!
... View more