Splunk Enterprise

Exclude Old data

Sree
Loves-to-Learn

Hi,

I'm trying to exclude events that have an old timestamp in a url which look like this - 

{"timestamp": 1626739199.964, "c-ip": "178.245.92.14", "time-to-first-byte": 0.002, "sc-status": 404, "sc-bytes": 467, "cs-method": "GET", "cs-protocol": "https", "cs-host": "xxxxxxx", "cs-uri-stem": "/out/v1/bac5ea7d5e06476598d34ba48b3f1bd1/index_8_0.m3u8?start=2021-07-16T16:40:07+00:00",

 

here timestamp and the start date are different.So is there any way to index the events have start date as current day.

Thanks in advance

Labels (1)
0 Karma

richgalloway
SplunkTrust
SplunkTrust

Convert the start date to epoch form then filter on it.

... | eval startDate=strptime(start,"%Y-%m-%dT%H:%M:%S%:z")
| where startDate>=relative_time(now(), "@d")
---
If this reply helps you, Karma would be appreciated.
0 Karma

Sree
Loves-to-Learn

Hi @richgalloway 

Thanks for the reply but  your answer is for the splunk events that got already indexed.

I'm trying to filter the data at the sourcetype level before it gets indexed.

Tags (1)
0 Karma

richgalloway
SplunkTrust
SplunkTrust

Sorry, misunderstood the question.  Filtering at index time requires a transform that sends data to nullQueue.  The trick (for which I don't have an answer) is writing a regex that matches the current day without having to change it every day.  I'm not sure it's possible.  Perhaps Cribl can do it.

---
If this reply helps you, Karma would be appreciated.
0 Karma
Get Updates on the Splunk Community!

Splunkers, Pack Your Bags: Why Cisco Live EMEA is Your Next Big Destination

The Power of Two: Splunk + Cisco at "Ludicrous Scale"   You know Splunk. You know Cisco. But have you seen ...

Data Management Digest – January 2026

Welcome to the January 2026 edition of Data Management Digest! Welcome to the January 2026 edition of Data ...

Splunk SOAR Now Available on Google Cloud Platform

We’re excited to announce that Splunk SOAR is now natively available as a SaaS solution on Google Cloud ...