Hi All,
I have logs which is from db_inputs/custom_script where owner not indexing custom time field as _time and they are importing all data every day without incremental.
So i need to find assets which is last 7days with custom time field
custom time field is last_found,
from these date&time how can i search assets which is only last 7days from last_found custom time field. Please help on the query that would be great help.
Thanks!
Hi @kpavan ,
You could use strptime to convert last_found to an epoch timestamp: https://docs.splunk.com/Documentation/SCS/current/SearchReference/DateandTimeFunctions#strptime
Then do something like:
| eval seven_days_ago=relative_time(now(), "-7d")
Then search for events where last_found > seven_days_ago
Thanks,
Jamie
Hi @kpavan ,
You could use strptime to convert last_found to an epoch timestamp: https://docs.splunk.com/Documentation/SCS/current/SearchReference/DateandTimeFunctions#strptime
Then do something like:
| eval seven_days_ago=relative_time(now(), "-7d")
Then search for events where last_found > seven_days_ago
Thanks,
Jamie
Thanks you @jamie00171,
I tried your solution with below query, I think am getting expected results. Thanks agian!
| eval etime=(strftime(strptime(last_found,"%Y-%m-%dT%H:%M:%S.%Q%Z"),"%s"))
| eval seven_days_ago=relative_time(now(), "-7d")
| where etime > seven_days_ago