Dashboards & Visualizations

How can I get now() to be in UTC?

cwapshere
Explorer

Seems like such a trivial question but I can't find the answer.

I'm new to Splunk and troubleshooting a dashboard set up by someone else. He was using "now() - _time" to show "Data Freshness" - however _time is in UTC in the incoming data, so I just need now() to be in UTC as well. How do I do that in the search?

1 Solution

lguinn2
Legend

I think you have most of this from the other answers, but let me summarize:

When the data comes from a forwarder, the forwarder (version 6.x) supplies local time zone information that Splunk uses to calculate _time in UTC. So, the data is always stored in the index with _time in UTC. If the data does not have the proper time, it may be because the Splunk admin who set up the forwarding missed something. Perhaps the time zone information is not being picked up somewhere along the way, or props.conf needs to have a timezone setting on the indexer. You can find more info here: How timestamp assignment works

That said - when you sign onto Splunk, there is a time zone associated with your user account. So if you had your user timezone set to Pacific Time, then the Splunk UI will display all times (including _time and now()) in Pacific Time. So what you see may well be different from the value that is actually stored, but it will be consistent.

| eval freshness = now() - _time

Calculates "freshness" as the number of seconds between the event timestamp and the time that the search started.

Finally, you might also try the reltime command for what you want. (If I understand what you want.)

yoursearchhere
| head 1
| reltime 
| eval output="Last event was " . reltime
| table output

Creates a field named "output" which displays stuff like "Last event was 27 seconds ago." And you don't have to do the math yourself.

View solution in original post

lguinn2
Legend

I think you have most of this from the other answers, but let me summarize:

When the data comes from a forwarder, the forwarder (version 6.x) supplies local time zone information that Splunk uses to calculate _time in UTC. So, the data is always stored in the index with _time in UTC. If the data does not have the proper time, it may be because the Splunk admin who set up the forwarding missed something. Perhaps the time zone information is not being picked up somewhere along the way, or props.conf needs to have a timezone setting on the indexer. You can find more info here: How timestamp assignment works

That said - when you sign onto Splunk, there is a time zone associated with your user account. So if you had your user timezone set to Pacific Time, then the Splunk UI will display all times (including _time and now()) in Pacific Time. So what you see may well be different from the value that is actually stored, but it will be consistent.

| eval freshness = now() - _time

Calculates "freshness" as the number of seconds between the event timestamp and the time that the search started.

Finally, you might also try the reltime command for what you want. (If I understand what you want.)

yoursearchhere
| head 1
| reltime 
| eval output="Last event was " . reltime
| table output

Creates a field named "output" which displays stuff like "Last event was 27 seconds ago." And you don't have to do the math yourself.

cwapshere
Explorer

Wow thanks for the great explanation! I know sundareshr had also suggested reltime but when I looked at the doc I couldn't understand why it had no argumates - was still thinking I needed to feed it two dates. That does seem to have worked.

0 Karma

sideview
SplunkTrust
SplunkTrust

One minor note - @lguinn said "the data is always stored in the index with _time in UTC", but this is confusing and not technically true. Splunk stores the _time in "epochtime" , meaning as the number of seconds since 12am 1/1/1970 in gmt.
On the other hand "UTC" is a timezone, so to store time "in UTC" would technically mean to store it as a string that looks something like "Tue, 04 Oct 2016 02:38:31 UTC".

0 Karma

sideview
SplunkTrust
SplunkTrust

It's kind of a mindbending question, but I think the answer is this - _time is an epochtime value, and that's also what now() returns. ie a number of seconds since the "epoch" started, which is in turn defined as 12am on 1/1/1970 if you were standing in GMT at that moment.

The Splunk UI itself will automatically convert _time to be in local time, and this can lead to a misunderstanding that _time is itself a string value. Which can in turn lead to confusing attempts to convert it to another timezone like UTC.

hth

cwapshere
Explorer

I think there may be an issue with the splunk forwarder assuming the incoming _time values are local instead of UTC.

I'm going to see if I can figure out how to get at the raw value because I can't change the forwarder at this time. Thanks for the help!

0 Karma

sundareshr
Legend

Try something like this.

| makeresults | eval x=now() | eval pst=strptime(strftime(x,"%m/%d/%Y %H:%M:%S UTC"),"%m/%d/%Y %H:%M:%S %Z") | eval mst=strptime(strftime(x,"%m/%d/%Y %H:%M:%S MST"),"%m/%d/%Y %H:%M:%S %Z")  | eval est=strptime(strftime(x,"%m/%d/%Y %H:%M:%S EST"),"%m/%d/%Y %H:%M:%S %Z") | eval utc=strptime(strftime(x,"%m/%d/%Y %H:%M:%S UTC"),"%m/%d/%Y %H:%M:%S %Z") | table x pst mst est utc | foreach * [eval <<FIELD>>=strftime(<<FIELD>>, "%c")]
0 Karma

cwapshere
Explorer

Thanks for that. I tried a simplified version which just ave me the UTC time I wanted:

eval nowutc=strptime(strftime(now(),"%m/%d/%Y %H:%M:%S UTC"),"%m/%d/%Y %H:%M:%S %Z") | eval result = nowutc - _time

But the resultant number is the same as I get from this:

eval result=now() - _time

I'm starting to think the issue is _time and not now(). Eg., I have a panel showing "Last Event Was 27 Hours Ago" when I have events from 16 hours ago - and I am in UTC+11. All the data files are in JSON format with a _time field, for every event, in UTC. Now I'm thinking splunk is interpreting that as local time...

0 Karma

sundareshr
Legend

Have you tried the reltime command? It may give you what you're looking for

https://docs.splunk.com/Documentation/Splunk/6.4.3/SearchReference/Reltime

_time is always stored as epoch time and then converted to the timezone specified in .conf files.

Get Updates on the Splunk Community!

Earn a $35 Gift Card for Answering our Splunk Admins & App Developer Survey

Survey for Splunk Admins and App Developers is open now! | Earn a $35 gift card!      Hello there,  Splunk ...

Continuing Innovation & New Integrations Unlock Full Stack Observability For Your ...

You’ve probably heard the latest about AppDynamics joining the Splunk Observability portfolio, deepening our ...

Monitoring Amazon Elastic Kubernetes Service (EKS)

As we’ve seen, integrating Kubernetes environments with Splunk Observability Cloud is a quick and easy way to ...