Is it possible, and if so, how would I, filter specific terms but only for a certain time range within a broader search?
For example, say I’m retrieving all failed logons for the last 24 hours like this:
index=myindex logonmessage=FAILED
Now, let’s say there’s a certain account that always fails to logon between 0200 and 0300 every day called bob. We’ve investigated these and worked with the team responsible for the application, and these failures are expected and unchangeable due to some architectural considerations.
How do I modify my search to basically say:
NOT (username=bob AND timestamp > 0200 AND timestamp < 0300)
Is that possible?
Thank you all!
Hello. If the errors are only in that one hour, how about something like this. Splunk automatically gives you the date_hour field.
index=myindex logonmessage=FAILED date_hour!=2 username!=bob
Be sure to read the difference between != versus NOT in the Splunk docs
https://docs.splunk.com/Documentation/Splunk/7.2.4/Search/NOTexpressions
i) username!=bob (implies there is a username field in the data and doesn't match bob)
ii) NOT username=bob . .. if the event doesn't have any field with username in it, it will be returned