Splunk Search

How to edit my search to sort the count to only show hosts that have not been seen over 2 hours?

SecurityIsMyMid
Explorer

I'm trying to sort an hour search with:

eval mydiff=tostring(info_search_time-orig_time, "duration") | table orig_host,lastTime,mydiff | rename orig_host AS "Hostname", lastTime AS "Last Time Seen", mydiff AS "Days Not Seen" 

How do I sort the count to only show hosts that haven't been seen over 2 hours?

Thanks

0 Karma

richgalloway
SplunkTrust
SplunkTrust

Something like this should get you started.

eval mydiff=tostring(info_search_time-orig_time, "duration") | where lastTime < relative_time(now(),"-2h") | table orig_host,lastTime,mydiff | rename orig_host AS "Hostname", lastTime AS "Last Time Seen", mydiff AS "Days Not Seen" 
---
If this reply helps you, Karma would be appreciated.
0 Karma
Get Updates on the Splunk Community!

Observe and Secure All Apps with Splunk

  Join Us for Our Next Tech Talk: Observe and Secure All Apps with SplunkAs organizations continue to innovate ...

Splunk Decoded: Business Transactions vs Business IQ

It’s the morning of Black Friday, and your e-commerce site is handling 10x normal traffic. Orders are flowing, ...

Fastest way to demo Observability

I’ve been having a lot of fun learning about Kubernetes and Observability. I set myself an interesting ...