Splunk Search

Event count before and after a specified time

jboustead
Explorer

I am looking to count the number of events that occur before and after a specified time (8am) each day to give a table like for example:

Events before 8amEvents after 8am
40050

 

Any help greatly appreciated?

Labels (1)
0 Karma
1 Solution

ITWhisperer
SplunkTrust
SplunkTrust
| stats count(eval(date_hour<8)) as "Events before 8am" count(eval(date_hour>=8)) as "Events after 8am"

View solution in original post

0 Karma

ITWhisperer
SplunkTrust
SplunkTrust
| stats count(eval(date_hour<8)) as "Events before 8am" count(eval(date_hour>=8)) as "Events after 8am"
0 Karma
Get Updates on the Splunk Community!

Community Content Calendar, November Edition

Welcome to the November edition of our Community Spotlight! Each month, we dive into the Splunk Community to ...

October Community Champions: A Shoutout to Our Contributors!

As October comes to a close, we want to take a moment to celebrate the people who make the Splunk Community ...

Stay Connected: Your Guide to November Tech Talks, Office Hours, and Webinars!

What are Community Office Hours? Community Office Hours is an interactive 60-minute Zoom series where ...