Splunk Search

How to convert date string to date format in string and extract all the dates which are 60 and 90 days earlier than the current day?

vineeth_jain
Explorer

Hi All,

I am unable to convert date string to date format using below SPL query.

eval "-Last Logon Date" = strptime("Last Logon Date", "%m/%d/%Y") | sort "Last Logon Date" | table "User Name", "User Lock Status", "Last Logon Date"

Also while sorting it is not properly performing the operation. Please suggest how to extract date values from Last Logon Date column which are 60 or 90 days earlier.

Thanks,
Vineeth Jain

Tags (3)
0 Karma
1 Solution

woodcock
Esteemed Legend

There are many things wrong here. Field names with spaces are EVIL. Never use sort without a number after it (get in the habit of sort 0 for unlimited). Try this:

... | rename "* * * * *" AS *_*_*_*_*, "* * * *" AS *_*_*_*, "* * *" AS *_*_*, "* *" AS *_*
| eval Last_Logon_Date = strptime(Last_Logon_Date, "%m/%d/%Y") 
| where ((Last_Logon_Date >= relative_time(now(), "-90d")) AND (Last_Logon_Date <= relative_time(now(), "-60d")))
| sort 0 - Last_Logon_Date
| fieldformat Last_Logon_Date = strftime(Last_Logon_Date, "%m/%d/%Y")
| table User_Name User_Lock_Status Last_Logon_Date

View solution in original post

woodcock
Esteemed Legend

There are many things wrong here. Field names with spaces are EVIL. Never use sort without a number after it (get in the habit of sort 0 for unlimited). Try this:

... | rename "* * * * *" AS *_*_*_*_*, "* * * *" AS *_*_*_*, "* * *" AS *_*_*, "* *" AS *_*
| eval Last_Logon_Date = strptime(Last_Logon_Date, "%m/%d/%Y") 
| where ((Last_Logon_Date >= relative_time(now(), "-90d")) AND (Last_Logon_Date <= relative_time(now(), "-60d")))
| sort 0 - Last_Logon_Date
| fieldformat Last_Logon_Date = strftime(Last_Logon_Date, "%m/%d/%Y")
| table User_Name User_Lock_Status Last_Logon_Date

vineeth_jain
Explorer

Thanks for your reply and suggestion about field names. It has worked for me.

Another doubt, how can I export the results of this search using email notification. I have tried alert option but unable to send email notification.

woodcock
Esteemed Legend

Click Accept to close this question and ask another one; let's keep this orderly. The probably answer to your other question is that you did not configure the email settings (correctly) on the search head.

0 Karma
Career Survey
First 500 qualified respondents will receive a $20 gift card! Tell us about your professional Splunk journey.
Get Updates on the Splunk Community!

Introduction to Splunk AI

How are you using AI in Splunk? Whether you see AI as a threat or opportunity, AI is here to stay. Lucky for ...

Splunk + ThousandEyes: Correlate frontend, app, and network data to troubleshoot ...

Are you tired of troubleshooting delays caused by siloed frontend, application, and network data? We've got a ...

Maximizing the Value of Splunk ES 8.x

Splunk Enterprise Security (ES) continues to be a leader in the Gartner Magic Quadrant, reflecting its pivotal ...