All Apps and Add-ons
Highlighted

How to filter last 24hrs events from inputlookup

Explorer

Hello Splunk Experts

As I have scheduled search(running every hr) creating output lookup file and from there I am using that as input lookup in my dashboards to draw trends for last 7 days and 24 hrs.
However for last 7 days I am able to draw the trend but for 24 hrs I dont know how to filter the events from the overall lookup.

Overall the lookup contains 7 days data and I need to draw the trend for last 7 days and 24 hrs trend.

Kindly help me with the concept please.

Thanks

0 Karma
Highlighted

Re: How to filter last 24hrs events from inputlookup

| inputlookup lookupname | addinfo | where time_field < infomaxtime and time_field> infomintime

P.S. it works best if you have your time field in epoch, else you need to do pre processing on your time field like

| inputlookup lookupname | eval time_field= strptime(time_field, time_format) | addinfo | where time_field < infomaxtime and time_field> infomintime

View solution in original post

Highlighted

Re: How to filter last 24hrs events from inputlookup

Explorer

Thanks Sid - It worked for me.

0 Karma
Highlighted

Re: How to filter last 24hrs events from inputlookup

Esteemed Legend

Like this:

|inputlookup YourLookupFileWithTimeDateFieldHere
| where _time >= relative_time(now(), "-24h")
Highlighted

Re: How to filter last 24hrs events from inputlookup

Explorer

Thanks Woodcock for the response.

0 Karma
Speak Up for Splunk Careers!

We want to better understand the impact Splunk experience and expertise has has on individuals' careers, and help highlight the growing demand for Splunk skills.