Splunk Search

Display Events Within a Specific Time Range

shingdayho
Explorer

Hello,

I want to create a report which currently shows me the events by hour. I want to change these to only between 22:00-08:00. Is there anyway to set in the search to only show results within those hours or specify which hours you want to see results for?

Thanks,

Tags (2)
0 Karma

shingdayho
Explorer

My report shows events per hour, example:

22:00 - 10
23:00 - 7
00:00 - 3
01:00 - 2

I want it to show data only for hours 22:00 to 08:00. I do not want to see anything from 09:00 to 21:00.

0 Karma

vasanthmss
Motivator

try to add earliest and latest in your query as explained below. is it working?

V
0 Karma

vasanthmss
Motivator

Hi,

As you said you want a report that will summarize hourly events(as of now 24h) you want specific duration like 00:00 to 8:00. Suppose you have scheduled your report at 9.00 AM then you can calculate your required time duration like this earliest=-9h@h latest=-1h@h. Like the above calculation you can change the earliest and latest as per your scheduled timing.

the search will be,

index=_internal earliest=-9h@h latest=-1h@h | timechart span=1h count

Cheers!

V
0 Karma
Get Updates on the Splunk Community!

Accelerating Observability as Code with the Splunk AI Assistant

We’ve seen in previous posts what Observability as Code (OaC) is and how it’s now essential for managing ...

Integrating Splunk Search API and Quarto to Create Reproducible Investigation ...

 Splunk is More Than Just the Web Console For Digital Forensics and Incident Response (DFIR) practitioners, ...

Congratulations to the 2025-2026 SplunkTrust!

Hello, Splunk Community! We are beyond thrilled to announce our newest group of SplunkTrust members!  The ...