What are you trying to do?
Bucket and Span are all timestamp based. If you are importing a CSV file and it doesnt recognize it by default, you'll have to specify the timestamp field. Otherwise your imported csv is just two fields; ID,DATE. These fields containing ID,and DATE values.
If you want the date field to be recognized as the time stamp for the field ID, then you'll need to modify the sourcetype via props.conf.
TIME_PREFIX = ,
TIME_FORMAT = %Y-%M-%d %h:%m:%s.%N3
You'll need to work on the strptime formatting of your 'timestamp' field..
I have converted it into splunk readable timestamp now.
eval timestamp=strptime(Date, "%Y-%m-%dT%H:%M:%S.%lZ")|eval req_time=strftime(timestamp, "%d/%m/%Y %I:%M:%S %p")|
But how can I extract only the recent day's rows data?
Is the timestamp of the records recognized by Splunk as the event time? If so you should be able use the time range picker to select only the last day.
If the Date field is not used for timestamp extraction you can parse it using strptime function in eval and then use where to filter out the events, at a high level the search should look smth like this; .... | eval t=strptime(Date, .....) | where t > now() - 24*3600
I have tried the same query you posted above. But I guess the result I am looking for is little different.
Actually the data I am getting is not continuous, hence whatever is the date on logs, whether of 2014 or 2011, I need to extract data of only last day from the logs. It should not have any correlation with current date.