Splunk Search

How do I search across a specific or custom time range within each hour of the day?

maverick
Splunk Employee
Splunk Employee

I have millions of events being indexed by Splunk now and I suspect something is happening within my IT environment around the top of every hour, but I am not sure what it is yet. So I would like to narrow my scheduled search time range down to only search a few minutes before and a few minutes after each hour of the day.

1 Solution

maverick
Splunk Employee
Splunk Employee

You could try this:

(your search terms here) AND (date_minute >= 50 OR date_minute < 10)

This search will find all events that match your specific search terms while narrowing down the time range between the last ten minutes of the last hour and the first ten minutes of the next hour, like you are wanting.

View solution in original post

maverick
Splunk Employee
Splunk Employee

You could try this:

(your search terms here) AND (date_minute >= 50 OR date_minute < 10)

This search will find all events that match your specific search terms while narrowing down the time range between the last ten minutes of the last hour and the first ten minutes of the next hour, like you are wanting.

Get Updates on the Splunk Community!

Now Available: Cisco Talos Threat Intelligence Integrations for Splunk Security Cloud ...

At .conf24, we shared that we were in the process of integrating Cisco Talos threat intelligence into Splunk ...

Preparing your Splunk Environment for OpenSSL3

The Splunk platform will transition to OpenSSL version 3 in a future release. Actions are required to prepare ...

Easily Improve Agent Saturation with the Splunk Add-on for OpenTelemetry Collector

Agent Saturation What and Whys In application performance monitoring, saturation is defined as the total load ...