Splunk Search

How to not evaluate something during a certain time period?

kdimaria
Communicator

So, I have a search query that calculates a field but I wanted to know if there is a way to check if it is a certain time period and then to not calculate that field. I have a start time and end time: for example: 10/13/2017 12:10:00 and end time 10/20/2017 14:20:00. And I wanted to change the eval so that if the current time matches that time field then to make a different calculation than what its currently calculating. Basically eval field=if("in time frame",new calculation, old calculation)

Thanks

0 Karma
1 Solution

gcusello
SplunkTrust
SplunkTrust

Hi kdimaria,
you could try something like this (if my_time is the field name in your logs but not _time):

| eval field=if(my_time>earliest AND my_time<latest,new calculation, old calculation)

Bye.
Giuseppe

View solution in original post

0 Karma

gcusello
SplunkTrust
SplunkTrust

Hi kdimaria,
you could try something like this (if my_time is the field name in your logs but not _time):

| eval field=if(my_time>earliest AND my_time<latest,new calculation, old calculation)

Bye.
Giuseppe

0 Karma
Get Updates on the Splunk Community!

Threat Hunting Unlocked: How to Uplevel Your Threat Hunting With the PEAK Framework ...

WATCH NOWAs AI starts tackling low level alerts, it's more critical than ever to uplevel your threat hunting ...

Splunk APM: New Product Features + Community Office Hours Recap!

Howdy Splunk Community! Over the past few months, we’ve had a lot going on in the world of Splunk Application ...

Index This | Forward, I’m heavy; backward, I’m not. What am I?

April 2024 Edition Hayyy Splunk Education Enthusiasts and the Eternally Curious!  We’re back with another ...