He guys
I have 2 years data
how do I get the Specify time ranges
e.g. from 6am to 12pm every days
Thanks for your answer.
Just restrict the inbuilt date_hour
field to values 6 - 12
index=<your_index> | where date_hour>=6 and date_hour<=12
Hi laudai,
in you search insert the following condition:
your_search date_hour>5 | ...
Bye.
Giuseppe
Just restrict the inbuilt date_hour
field to values 6 - 12
index=<your_index> | where date_hour>=6 and date_hour<=12
I would actually pipe to base search rather than additional where clause for two reasons:
1) Filtering records upfront in base search is faster.
2) search fieldName=value is faster than where fieldname=value
index=<your_index> date_hour>=6 and date_hour<=12
Is there has column name date_hour ? I can't use this search so I use Regular Expression
date_* default fields are not available for all sources, for instance they are not present for Windows event logs.
https://docs.splunk.com/Documentation/Splunk/6.5.3/Knowledge/Usedefaultfields
You can try creating the field like below and then filter -
| eval date_hour=strftime(_time,"%H") | where date_hour>=6 and date_hour<=12
Thanks for your answer.