Hello I have a sourcetype that have a lot thousands of event each minute so it is very big. i have a use case that i need to search for specific event in this source type , in some points of time during the night, (22:30-22:40 , 01:30-01:40 , 03:00-03:10). i have to find all the hosts that have the specific event 3 time at night in this time periods , and i need to check it for the last 7 days (the result i need at the end is count the number of night with 3 occurrence of the event in the last week) at the first step i am trying to reduce the number of events for this search by searching only for events in this time frame. i tried to eval new fields with the value of the hour, and filtering base on that field. this is not so good because splunk need to check all the events and then filter them. what is the best and efficient way to reduce the number of event that are included in my search to only those in the time periods above ? Thanks
... View more