Splunk Search

Search event logs that only accrue between 4PM to 11:59PM every day

kpers
Path Finder

Looking to see if there is a way to search for only specific windows event logs that accrue after 4 pm up to 11:59 pm each day.

I know I can do this on a specific day but I would like to get a look at all the times a user locks their workstation that accrue around the time people leave work for the day all the way till the end of the day and see it over a weeks span or even an months span.

Tags (3)
0 Karma

linu1988
Champion

Hello,
Try this

index=blah EventCode=""|eval Hour=strftime(_time,"%H")|table EventCode,Message|where Hour >16 AND Hour <= 23

It's not an efficient search but will serve your purpose.

Thanks

0 Karma

lukejadamec
Super Champion

Yes you can. I short you use this in your search:

<your search> date_hour>9 date_hour<18

For more details you can checkout this post.

http://answers.splunk.com/answers/2219/search-command-for-work-time

linu1988
Champion

date_hour<24 you wont get ever so only > 15 is enough, was out of my mind in my answer 😕

0 Karma

kpers
Path Finder

Thank you that did the trick, I just put in:
"eventidentifier=4800" date_hour>15 date_hour<24
and I got the results I was looking for!

0 Karma

somesoni2
Revered Legend

Even shorter

..your base search terms.. date_hour>15

Get Updates on the Splunk Community!

Get the T-shirt to Prove You Survived Splunk University Bootcamp

As if Splunk University, in Las Vegas, in-person, with three days of bootcamps and labs weren’t enough, now ...

Introducing the Splunk Community Dashboard Challenge!

Welcome to Splunk Community Dashboard Challenge! This is your chance to showcase your skills in creating ...

Wondering How to Build Resiliency in the Cloud?

IT leaders are choosing Splunk Cloud as an ideal cloud transformation platform to drive business resilience,  ...