Splunk Search

search the request if only it presents in certain date range

gowithwind22
New Member

I have a field called "request", I want to output all the log lines in history if the request value presents in certain date range. for example.

1/1/2018 10:00:00 x0
1/2/2018 11:00:00 x1
1/3/2018 10:00::00 x2
1/5/2018 10:00:00 x2
1/5/2018 11:00:00 x5

if 1/5/2018 if the date range, only x2, x5's history will return. Any idea how to do that?
PS: in the real world, the records' number is very large , there may be millions before the 1/1/2018 to the 1/5/2018.

Tags (1)
0 Karma

ddrillic
Ultra Champion

You can add to the query the following - earliest=1503982800&latest=1504760400. Please use the following for converting a date to an epoch time - Epoch & Unix Timestamp Conversion Tools

0 Karma

gowithwind22
New Member

my expected result is:
1/3/2018 10:00::00 x2
1/5/2018 10:00:00 x2
1/5/2018 11:00:00 x5

not 1/5/2018 10:00:00 x2
1/5/2018 11:00:00 x5

0 Karma
Get Updates on the Splunk Community!

Building Reliable Asset and Identity Frameworks in Splunk ES

 Accurate asset and identity resolution is the backbone of security operations. Without it, alerts are ...

Cloud Monitoring Console - Unlocking Greater Visibility in SVC Usage Reporting

For Splunk Cloud customers, understanding and optimizing Splunk Virtual Compute (SVC) usage and resource ...

Automatic Discovery Part 3: Practical Use Cases

If you’ve enabled Automatic Discovery in your install of the Splunk Distribution of the OpenTelemetry ...