Splunk Search

Need solution with custom time field

vijaynela
New Member

I am working Service now logs in Splunk. The tickets data has one field called "sys_created" this field gives the ticket created time in "%Y-%m-%d %H:%M:%S" format.

when I am running the query for the last 7 days. The tickets which were raised before 7 days are also populating because of another field called sys_updated.

This sys_updated field will store all the updates in the tickets, so if an old ticket is updated within last 7 days, it will be populated when i keep timerange picker as last 7 days.

Is there a way to consider "sys_created"  as "_time" ?

Labels (1)
0 Karma

ITWhisperer
SplunkTrust
SplunkTrust

_time is set for the event when it is ingested. If you change the way the event is ingested, then perhaps you could use a different part of the event for the timestamp. However, this would only apply going forward, it would not re-index the existing events.

One possibility is that you could copy (using the collect command) the events to another index having reset the _time field to the value you want.

0 Karma
Get Updates on the Splunk Community!

Splunk Observability as Code: From Zero to Dashboard

For the details on what Self-Service Observability and Observability as Code is, we have some awesome content ...

[Puzzles] Solve, Learn, Repeat: Character substitutions with Regular Expressions

This challenge was first posted on Slack #puzzles channelFor BORE at .conf23, we had a puzzle question which ...

Shape the Future of Splunk: Join the Product Research Lab!

Join the Splunk Product Research Lab and connect with us in the Slack channel #product-research-lab to get ...