Splunk Search

How to not evaluate something during a certain time period?

kdimaria
Communicator

So, I have a search query that calculates a field but I wanted to know if there is a way to check if it is a certain time period and then to not calculate that field. I have a start time and end time: for example: 10/13/2017 12:10:00 and end time 10/20/2017 14:20:00. And I wanted to change the eval so that if the current time matches that time field then to make a different calculation than what its currently calculating. Basically eval field=if("in time frame",new calculation, old calculation)

Thanks

0 Karma
1 Solution

gcusello
SplunkTrust
SplunkTrust

Hi kdimaria,
you could try something like this (if my_time is the field name in your logs but not _time):

| eval field=if(my_time>earliest AND my_time<latest,new calculation, old calculation)

Bye.
Giuseppe

View solution in original post

0 Karma

gcusello
SplunkTrust
SplunkTrust

Hi kdimaria,
you could try something like this (if my_time is the field name in your logs but not _time):

| eval field=if(my_time>earliest AND my_time<latest,new calculation, old calculation)

Bye.
Giuseppe

0 Karma
Get Updates on the Splunk Community!

Automatic Discovery Part 1: What is Automatic Discovery in Splunk Observability Cloud ...

If you’ve ever deployed a new database cluster, spun up a caching layer, or added a load balancer, you know it ...

Real-Time Fraud Detection: How Splunk Dashboards Protect Financial Institutions

Financial fraud isn't slowing down. If anything, it's getting more sophisticated. Account takeovers, credit ...

Splunk + ThousandEyes: Correlate frontend, app, and network data to troubleshoot ...

 Are you tired of troubleshooting delays caused by siloed frontend, application, and network data? We've got a ...