Splunk Search

Can't find the timestamp

jetzt82
Explorer
AUTOLOGIN..10100000000001..Polaris/5.0 (pc, Windows 7/6.1, ja-JP) PolarisOfficeLink/1.8.14..**1415285996**..192.168.0.1
AUTOLOGIN..10100000000003..Polaris/5.0 (ipad, ios/7.100000, es-CO) PolarisPlugin/6.0.9279.01-IU40 Version/6.0.1 Model/iPad2,5-{768, 1024}..**1415285996**..192.168.0.3
LOGIN..10100000000006..Polaris/5.0 (iphone, ios/8.000000, en-VN) PolarisPlugin/6.0.9279.01-IU40 Version/6.0.1 Model/iPhone7,2-{640, 1136}..**1415285997**..192.168.0.5

When the above log, can not find the time.
timestamp value: 1415285996, 1415285996, 1415285997

How can I find a timestamp?

Tags (2)

grijhwani
Motivator

The quickest way would be to use the interactive field extractor when viewing the log.

But if you want to do it manually a regex along the lines of \*\*(?P< epochtime >)\*\* should do it for you.

grijhwani
Motivator

Had to introduce bogus spaces into the answer above, because the form was removing anything in angle brackets.

0 Karma
Get Updates on the Splunk Community!

Celebrating Fast Lane: 2025 Authorized Learning Partner of the Year

At .conf25, Splunk proudly recognized Fast Lane as the 2025 Authorized Learning Partner of the Year. This ...

Tech Talk Recap | Mastering Threat Hunting

Mastering Threat HuntingDive into the world of threat hunting, exploring the key differences between ...

Observability for AI Applications: Troubleshooting Latency

If you’re working with proprietary company data, you’re probably going to have a locally hosted LLM or many ...