Splunk Search

What time should be when searching old logs?

dujas
Explorer

dujas_1-1676472668808.png

I am using Splunk searching old log files and the _time is different from log time, would this make sense or do I have to parse the log to set  _time to log time?

Thanks.

Labels (2)
0 Karma
1 Solution

gcusello
SplunkTrust
SplunkTrust

Hi @dujas,

yes, usually the event timestamp (_time) is the same of the event.

You have to better parse your logs to have as timestamp, the event timestamp.

Ciao.

Giuseppe

View solution in original post

0 Karma

gcusello
SplunkTrust
SplunkTrust

Hi @dujas,

yes, usually the event timestamp (_time) is the same of the event.

You have to better parse your logs to have as timestamp, the event timestamp.

Ciao.

Giuseppe

0 Karma

dujas
Explorer

Thanks @gcusello , I have parsed the log line and made it work.

0 Karma

gcusello
SplunkTrust
SplunkTrust

Hi @dujas,

good for you, see next time!

Ciao and happy splunking

Giuseppe

P.S.: Karma Points are appreciated 😉

0 Karma
Get Updates on the Splunk Community!

Index This | I’m short for "configuration file.” What am I?

May 2024 Edition Hayyy Splunk Education Enthusiasts and the Eternally Curious!  We’re back with a Special ...

New Articles from Academic Learning Partners, Help Expand Lantern’s Use Case Library, ...

Splunk Lantern is a Splunk customer success center that provides advice from Splunk experts on valuable data ...

Your Guide to SPL2 at .conf24!

So, you’re headed to .conf24? You’re in for a good time. Las Vegas weather is just *chef’s kiss* beautiful in ...