Splunk Search

Getting the timestamp when the status has changed

honey527
New Member

We are getting the data from Database for every 5mins.

Even the field value doesn't change the same value will be indexed with different timestamp for every 5 mins.

There is a status field which indicates whether the device is on or off.

we want to get the time of the status change for the device with the timestamp.

please suggest the query for this

Labels (1)
0 Karma

scelikok
SplunkTrust
SplunkTrust

Hi @honey527,

Please try below;

| dedup _time status
| table _time status

 

If this reply helps you an upvote and "Accept as Solution" is appreciated.
0 Karma
Get Updates on the Splunk Community!

Splunk Enterprise Security 8.x: The Essential Upgrade for Threat Detection, ...

 Prepare to elevate your security operations with the powerful upgrade to Splunk Enterprise Security 8.x! This ...

Get Early Access to AI Playbook Authoring: Apply for the Alpha Private Preview ...

Passionate about security automation? Apply now to our AI Playbook Authoring Alpha private preview ...

Reduce and Transform Your Firewall Data with Splunk Data Management

Managing high-volume firewall data has always been a challenge. Noisy events and verbose traffic logs often ...