Splunk Search

Date AND Time Range

whathuh
New Member

I'm pretty new to Splunk, so hopefully this is an easy question. I've looked all over the community questions and I have no problems finding out how to search for ranges of dates OR times, but for the life of me I can't figure out how to do dates AND times.

Basically I want to search for two EventCodes: 4624 and 4634. Because there are several thousand results on any given week, my only real concern is WHEN they logged on. I need to know when these IDs were created between the hours of 1700 and 0500 each day. I'd like to run this scan weekly, so is there a way to do -7d AND between 1700 and 0500 the next day? I hope I'm articulating this correctly. Any help would be greatly appreciated.

-Adam

Tags (4)
0 Karma

adrianathome
Communicator

Adam,
This answer should point you in the right direction.

http://answers.splunk.com/answers/61365/getting-logs-for-after-hours-access

lukejadamec
Super Champion

I've been looking for that post for an hour since I saw this post.

0 Karma
Get Updates on the Splunk Community!

Data Management Digest – December 2025

Welcome to the December edition of Data Management Digest! As we continue our journey of data innovation, the ...

Index This | What is broken 80% of the time by February?

December 2025 Edition   Hayyy Splunk Education Enthusiasts and the Eternally Curious!    We’re back with this ...

Unlock Faster Time-to-Value on Edge and Ingest Processor with New SPL2 Pipeline ...

Hello Splunk Community,   We're thrilled to share an exciting update that will help you manage your data more ...