Splunk Search

How to restrict events based on the time range?

bollam
Path Finder

Hello,

I have a script which runs every 4 hours and the output is written to Splunk, Everyday six are being written to Splunk.
I need to restrict events based on the time range I select, For an instance, When I look for the last 24 hours I need only one event to be shown, but actually there are six events in the last 24 hours, Similarly when I check for the last 7 days I need to see only 7 events i.e., one event from each day need to be displayed. I'm not sure if it's possible.

Tags (1)
0 Karma

FrankVl
Ultra Champion

Try adding this to your search:

| bin _time span=1d | dedup _time

I think this gets you the last event of each day.

bollam
Path Finder

Thanks FrankVI for the prompt response!! It worked!!

0 Karma

FrankVl
Ultra Champion

You're welcome 🙂

Please mark the answer as accepted, so this can easily be found by others with the same question in the future 🙂

0 Karma
Get Updates on the Splunk Community!

Introducing the 2024 SplunkTrust!

Hello, Splunk Community! We are beyond thrilled to announce our newest group of SplunkTrust members!  The ...

Introducing the 2024 Splunk MVPs!

We are excited to announce the 2024 cohort of the Splunk MVP program. Splunk MVPs are passionate members of ...

Splunk Custom Visualizations App End of Life

The Splunk Custom Visualizations apps End of Life for SimpleXML will reach end of support on Dec 21, 2024, ...