Splunk Search

Time-based exclusion on a search

mhale1982
Path Finder

Is it possible, and if so, how would I, filter specific terms but only for a certain time range within a broader search?

For example, say I’m retrieving all failed logons for the last 24 hours like this:

index=myindex logonmessage=FAILED

Now, let’s say there’s a certain account that always fails to logon between 0200 and 0300 every day called bob. We’ve investigated these and worked with the team responsible for the application, and these failures are expected and unchangeable due to some architectural considerations.

How do I modify my search to basically say:

NOT (username=bob AND timestamp > 0200 AND timestamp < 0300)

Is that possible?

Thank you all!

Tags (1)
0 Karma

burwell
SplunkTrust
SplunkTrust

Hello. If the errors are only in that one hour, how about something like this. Splunk automatically gives you the date_hour field.

index=myindex  logonmessage=FAILED  date_hour!=2  username!=bob

Be sure to read the difference between != versus NOT in the Splunk docs
https://docs.splunk.com/Documentation/Splunk/7.2.4/Search/NOTexpressions

i) username!=bob (implies there is a username field in the data and doesn't match bob)
ii) NOT username=bob . .. if the event doesn't have any field with username in it, it will be returned

0 Karma
Get Updates on the Splunk Community!

Splunk Observability for AI

Don’t miss out on an exciting Tech Talk on Splunk Observability for AI!Discover how Splunk’s agentic AI ...

Splunk Enterprise Security 8.x: The Essential Upgrade for Threat Detection, ...

Watch On Demand the Tech Talk on November 6 at 11AM PT, and empower your SOC to reach new heights! Duration: ...

Splunk Observability as Code: From Zero to Dashboard

For the details on what Self-Service Observability and Observability as Code is, we have some awesome content ...