Splunk Search

Event count before and after a specified time

jboustead
Explorer

I am looking to count the number of events that occur before and after a specified time (8am) each day to give a table like for example:

Events before 8amEvents after 8am
40050

 

Any help greatly appreciated?

Labels (1)
0 Karma
1 Solution

ITWhisperer
SplunkTrust
SplunkTrust
| stats count(eval(date_hour<8)) as "Events before 8am" count(eval(date_hour>=8)) as "Events after 8am"

View solution in original post

0 Karma

ITWhisperer
SplunkTrust
SplunkTrust
| stats count(eval(date_hour<8)) as "Events before 8am" count(eval(date_hour>=8)) as "Events after 8am"
0 Karma
Get Updates on the Splunk Community!

Splunk Mobile: Your Brand-New Home Screen

Meet Your New Mobile Hub  Hello Splunk Community!  Staying connected to your data—no matter where you are—is ...

Introducing Value Insights (Beta): Understand the Business Impact your organization ...

Real progress on your strategic priorities starts with knowing the business outcomes your teams are delivering ...

Enterprise Security (ES) Essentials 8.3 is Now GA — Smarter Detections, Faster ...

As of today, Enterprise Security (ES) Essentials 8.3 is now generally available, helping SOC teams simplify ...