Splunk Search

How do I set a new field as a source of time?

zhatsispgx
Path Finder

After I have converted epoch time in first_seen to the format in c_time, how do i set c_time as my source of time? My end goal is to make the search below give me results where c_time is older than 7 days. (The data set is from a dbconnect batch import, so i cannot use _time)

index=main source=dns_zones sourcetype=inventory ip!=10.0.0.0/8 AND ip!=192.168.0.0/16 | 
dedup subdomain | 
eval c_time=strftime(first_seen,"%m/%d/%y %H:%M:%S") | 
search c_time >= now() - 7d | 
sort by -first_seen | 
table domain,subdomain,ip,c_time
0 Karma

sundareshr
Legend

Try this

 index=main source=dns_zones sourcetype=inventory ip!=10.0.0.0/8 AND ip!=192.168.0.0/16 | 
 dedup subdomain | 
 eval c_time=strptime(first_seen,"%m/%d/%y %H:%M:%S") | 
 where c_time <= relative_time(now(), "-7d") | 
 sort by -first_seen | 
 table domain, subdomain, ip, first_seen c_time
0 Karma
Get Updates on the Splunk Community!

Splunk Decoded: Service Maps vs Service Analyzer Tree View vs Flow Maps

It’s Monday morning, and your phone is buzzing with alert escalations – your customer-facing portal is running ...

What’s New in Splunk Observability – September 2025

What's NewWe are excited to announce the latest enhancements to Splunk Observability, designed to help ITOps ...

Fun with Regular Expression - multiples of nine

Fun with Regular Expression - multiples of nineThis challenge was first posted on Slack #regex channel ...