Splunk Search

Search event logs that only accrue between 4PM to 11:59PM every day

kpers
Path Finder

Looking to see if there is a way to search for only specific windows event logs that accrue after 4 pm up to 11:59 pm each day.

I know I can do this on a specific day but I would like to get a look at all the times a user locks their workstation that accrue around the time people leave work for the day all the way till the end of the day and see it over a weeks span or even an months span.

Tags (3)
0 Karma

linu1988
Champion

Hello,
Try this

index=blah EventCode=""|eval Hour=strftime(_time,"%H")|table EventCode,Message|where Hour >16 AND Hour <= 23

It's not an efficient search but will serve your purpose.

Thanks

0 Karma

lukejadamec
Super Champion

Yes you can. I short you use this in your search:

<your search> date_hour>9 date_hour<18

For more details you can checkout this post.

http://answers.splunk.com/answers/2219/search-command-for-work-time

linu1988
Champion

date_hour<24 you wont get ever so only > 15 is enough, was out of my mind in my answer 😕

0 Karma

kpers
Path Finder

Thank you that did the trick, I just put in:
"eventidentifier=4800" date_hour>15 date_hour<24
and I got the results I was looking for!

0 Karma

somesoni2
Revered Legend

Even shorter

..your base search terms.. date_hour>15

Get Updates on the Splunk Community!

Stay Connected: Your Guide to May Tech Talks, Office Hours, and Webinars!

Take a look below to explore our upcoming Community Office Hours, Tech Talks, and Webinars this month. This ...

They're back! Join the SplunkTrust and MVP at .conf24

With our highly anticipated annual conference, .conf, comes the fez-wearers you can trust! The SplunkTrust, as ...

Enterprise Security Content Update (ESCU) | New Releases

Last month, the Splunk Threat Research Team had two releases of new security content via the Enterprise ...