Splunk Search

Event count before and after a specified time

jboustead
Explorer

I am looking to count the number of events that occur before and after a specified time (8am) each day to give a table like for example:

Events before 8amEvents after 8am
40050

 

Any help greatly appreciated?

Labels (1)
0 Karma
1 Solution

ITWhisperer
SplunkTrust
SplunkTrust
| stats count(eval(date_hour<8)) as "Events before 8am" count(eval(date_hour>=8)) as "Events after 8am"

View solution in original post

0 Karma

ITWhisperer
SplunkTrust
SplunkTrust
| stats count(eval(date_hour<8)) as "Events before 8am" count(eval(date_hour>=8)) as "Events after 8am"
0 Karma
Get Updates on the Splunk Community!

Community Content Calendar, October Edition

Welcome to the October edition of our Community Spotlight! The Splunk Community is a treasure trove of ...

SOC4Kafka - New Kafka Connector Powered by OpenTelemetry

The new SOC4Kafka connector, built on OpenTelemetry, enables the collection of Kafka messages and forwards ...

Your Voice Matters! Help Us Shape the New Splunk Lantern Experience

Splunk Lantern is a Splunk customer success center that provides advice from Splunk experts on valuable data ...