Splunk Search

How to convert date string to date format in string and extract all the dates which are 60 and 90 days earlier than the current day?

vineeth_jain
Explorer

Hi All,

I am unable to convert date string to date format using below SPL query.

eval "-Last Logon Date" = strptime("Last Logon Date", "%m/%d/%Y") | sort "Last Logon Date" | table "User Name", "User Lock Status", "Last Logon Date"

Also while sorting it is not properly performing the operation. Please suggest how to extract date values from Last Logon Date column which are 60 or 90 days earlier.

Thanks,
Vineeth Jain

Tags (3)
0 Karma
1 Solution

woodcock
Esteemed Legend

There are many things wrong here. Field names with spaces are EVIL. Never use sort without a number after it (get in the habit of sort 0 for unlimited). Try this:

... | rename "* * * * *" AS *_*_*_*_*, "* * * *" AS *_*_*_*, "* * *" AS *_*_*, "* *" AS *_*
| eval Last_Logon_Date = strptime(Last_Logon_Date, "%m/%d/%Y") 
| where ((Last_Logon_Date >= relative_time(now(), "-90d")) AND (Last_Logon_Date <= relative_time(now(), "-60d")))
| sort 0 - Last_Logon_Date
| fieldformat Last_Logon_Date = strftime(Last_Logon_Date, "%m/%d/%Y")
| table User_Name User_Lock_Status Last_Logon_Date

View solution in original post

woodcock
Esteemed Legend

There are many things wrong here. Field names with spaces are EVIL. Never use sort without a number after it (get in the habit of sort 0 for unlimited). Try this:

... | rename "* * * * *" AS *_*_*_*_*, "* * * *" AS *_*_*_*, "* * *" AS *_*_*, "* *" AS *_*
| eval Last_Logon_Date = strptime(Last_Logon_Date, "%m/%d/%Y") 
| where ((Last_Logon_Date >= relative_time(now(), "-90d")) AND (Last_Logon_Date <= relative_time(now(), "-60d")))
| sort 0 - Last_Logon_Date
| fieldformat Last_Logon_Date = strftime(Last_Logon_Date, "%m/%d/%Y")
| table User_Name User_Lock_Status Last_Logon_Date

vineeth_jain
Explorer

Thanks for your reply and suggestion about field names. It has worked for me.

Another doubt, how can I export the results of this search using email notification. I have tried alert option but unable to send email notification.

woodcock
Esteemed Legend

Click Accept to close this question and ask another one; let's keep this orderly. The probably answer to your other question is that you did not configure the email settings (correctly) on the search head.

0 Karma
Got questions? Get answers!

Join the Splunk Community Slack to learn, troubleshoot, and make connections with fellow Splunk practitioners in real time!

Meet up IRL or virtually!

Join Splunk User Groups to connect and learn in-person by region or remotely by topic or industry.

Get Updates on the Splunk Community!

[Puzzles] Solve, Learn, Repeat: Matching cron expressions

This puzzle (first published here) is based on matching timestamps to cron expressions.All the timestamps ...

Design, Compete, Win: Submit Your Best Splunk Dashboards for a .conf26 Pass

Hello Splunkers,  We’re excited to kick off a Splunk Dashboard contest! We know that dashboards are a primary ...

May 2026 Splunk Expert Sessions: Security & Observability

Level Up Your Operations: May 2026 Splunk Expert Sessions Whether you are refining your security posture or ...