Splunk Enterprise

Exclude Old data

Sree
Loves-to-Learn

Hi,

I'm trying to exclude events that have an old timestamp in a url which look like this - 

{"timestamp": 1626739199.964, "c-ip": "178.245.92.14", "time-to-first-byte": 0.002, "sc-status": 404, "sc-bytes": 467, "cs-method": "GET", "cs-protocol": "https", "cs-host": "xxxxxxx", "cs-uri-stem": "/out/v1/bac5ea7d5e06476598d34ba48b3f1bd1/index_8_0.m3u8?start=2021-07-16T16:40:07+00:00",

 

here timestamp and the start date are different.So is there any way to index the events have start date as current day.

Thanks in advance

Labels (1)
0 Karma

richgalloway
SplunkTrust
SplunkTrust

Convert the start date to epoch form then filter on it.

... | eval startDate=strptime(start,"%Y-%m-%dT%H:%M:%S%:z")
| where startDate>=relative_time(now(), "@d")
---
If this reply helps you, Karma would be appreciated.
0 Karma

Sree
Loves-to-Learn

Hi @richgalloway 

Thanks for the reply but  your answer is for the splunk events that got already indexed.

I'm trying to filter the data at the sourcetype level before it gets indexed.

Tags (1)
0 Karma

richgalloway
SplunkTrust
SplunkTrust

Sorry, misunderstood the question.  Filtering at index time requires a transform that sends data to nullQueue.  The trick (for which I don't have an answer) is writing a regex that matches the current day without having to change it every day.  I'm not sure it's possible.  Perhaps Cribl can do it.

---
If this reply helps you, Karma would be appreciated.
0 Karma
Get Updates on the Splunk Community!

AI for AppInspect

We’re excited to announce two new updates to AppInspect designed to save you time and make the app approval ...

App Platform's 2025 Year in Review: A Year of Innovation, Growth, and Community

As we step into 2026, it’s the perfect moment to reflect on what an extraordinary year 2025 was for the Splunk ...

Operationalizing Entity Risk Score with Enterprise Security 8.3+

Overview Enterprise Security 8.3 introduces a powerful new feature called “Entity Risk Scoring” (ERS) for ...