Splunk Search

Filtering by 24h time in splunk

priyangshupal
Engager

I have a field timeofevent which contains the time at which the event was logged in 24 hour format.

Format of timeofevent: HH:MM

I want only the events which were logged between 18:30 to 08:30 CST.

Labels (1)
0 Karma

ITWhisperer
SplunkTrust
SplunkTrust

Try this

 

| where timeofevent>="18:30" OR timeofevent<="08:30"

 

0 Karma

priyangshupal
Engager

hi @ITWhisperer 

Shouldn't it be?

 

| where timeofevent>="18:30" AND timeofevent<="08:30"

 

0 Karma

ITWhisperer
SplunkTrust
SplunkTrust

Only if you want no results!

Splunk works on a pipeline of event, each event is processed separately, so an event cannot be both >18:30 and <08:30 at the same time

0 Karma

priyangshupal
Engager

By using

| where timeofevent>="18:30" OR timeofevent<="08:30"

it is returning all the events, even the ones which are outside of that timeframe

0 Karma

ITWhisperer
SplunkTrust
SplunkTrust

You probably need to convert the string to a number e.g. "18:30" becomes 1830 and "08:30" becomes 830

| eval timeofevent=tonumber(replace(timeofevent,":",""),10)
| where timeofevent>=1830 OR timeofevent<=830

 

0 Karma
Get Updates on the Splunk Community!

Observe and Secure All Apps with Splunk

  Join Us for Our Next Tech Talk: Observe and Secure All Apps with SplunkAs organizations continue to innovate ...

Splunk Decoded: Business Transactions vs Business IQ

It’s the morning of Black Friday, and your e-commerce site is handling 10x normal traffic. Orders are flowing, ...

Fastest way to demo Observability

I’ve been having a lot of fun learning about Kubernetes and Observability. I set myself an interesting ...