Splunk Search

Filtering by 24h time in splunk

priyangshupal
Engager

I have a field timeofevent which contains the time at which the event was logged in 24 hour format.

Format of timeofevent: HH:MM

I want only the events which were logged between 18:30 to 08:30 CST.

Labels (1)
0 Karma

ITWhisperer
SplunkTrust
SplunkTrust

Try this

 

| where timeofevent>="18:30" OR timeofevent<="08:30"

 

0 Karma

priyangshupal
Engager

hi @ITWhisperer 

Shouldn't it be?

 

| where timeofevent>="18:30" AND timeofevent<="08:30"

 

0 Karma

ITWhisperer
SplunkTrust
SplunkTrust

Only if you want no results!

Splunk works on a pipeline of event, each event is processed separately, so an event cannot be both >18:30 and <08:30 at the same time

0 Karma

priyangshupal
Engager

By using

| where timeofevent>="18:30" OR timeofevent<="08:30"

it is returning all the events, even the ones which are outside of that timeframe

0 Karma

ITWhisperer
SplunkTrust
SplunkTrust

You probably need to convert the string to a number e.g. "18:30" becomes 1830 and "08:30" becomes 830

| eval timeofevent=tonumber(replace(timeofevent,":",""),10)
| where timeofevent>=1830 OR timeofevent<=830

 

0 Karma
Get Updates on the Splunk Community!

Splunk Decoded: Service Maps vs Service Analyzer Tree View vs Flow Maps

It’s Monday morning, and your phone is buzzing with alert escalations – your customer-facing portal is running ...

What’s New in Splunk Observability – September 2025

What's NewWe are excited to announce the latest enhancements to Splunk Observability, designed to help ITOps ...

Fun with Regular Expression - multiples of nine

Fun with Regular Expression - multiples of nineThis challenge was first posted on Slack #regex channel ...