Splunk Search

Time-based exclusion on a search

mhale1982
Path Finder

Is it possible, and if so, how would I, filter specific terms but only for a certain time range within a broader search?

For example, say I’m retrieving all failed logons for the last 24 hours like this:

index=myindex logonmessage=FAILED

Now, let’s say there’s a certain account that always fails to logon between 0200 and 0300 every day called bob. We’ve investigated these and worked with the team responsible for the application, and these failures are expected and unchangeable due to some architectural considerations.

How do I modify my search to basically say:

NOT (username=bob AND timestamp > 0200 AND timestamp < 0300)

Is that possible?

Thank you all!

Tags (1)
0 Karma

burwell
SplunkTrust
SplunkTrust

Hello. If the errors are only in that one hour, how about something like this. Splunk automatically gives you the date_hour field.

index=myindex  logonmessage=FAILED  date_hour!=2  username!=bob

Be sure to read the difference between != versus NOT in the Splunk docs
https://docs.splunk.com/Documentation/Splunk/7.2.4/Search/NOTexpressions

i) username!=bob (implies there is a username field in the data and doesn't match bob)
ii) NOT username=bob . .. if the event doesn't have any field with username in it, it will be returned

0 Karma
Get Updates on the Splunk Community!

[Puzzles] Solve, Learn, Repeat: Dynamic formatting from XML events

This challenge was first posted on Slack #puzzles channelFor a previous puzzle, I needed a set of fixed-length ...

Enter the Agentic Era with Splunk AI Assistant for SPL 1.4

  &#x1f680; Your data just got a serious AI upgrade — are you ready? Say hello to the Agentic Era with the ...

Stronger Security with Federated Search for S3, GCP SQL & Australian Threat ...

Splunk Lantern is a Splunk customer success center that provides advice from Splunk experts on valuable data ...