Splunk Search

What time should be when searching old logs?

dujas
Explorer

dujas_1-1676472668808.png

I am using Splunk searching old log files and the _time is different from log time, would this make sense or do I have to parse the log to set  _time to log time?

Thanks.

Labels (2)
0 Karma
1 Solution

gcusello
SplunkTrust
SplunkTrust

Hi @dujas,

yes, usually the event timestamp (_time) is the same of the event.

You have to better parse your logs to have as timestamp, the event timestamp.

Ciao.

Giuseppe

View solution in original post

0 Karma

gcusello
SplunkTrust
SplunkTrust

Hi @dujas,

yes, usually the event timestamp (_time) is the same of the event.

You have to better parse your logs to have as timestamp, the event timestamp.

Ciao.

Giuseppe

0 Karma

dujas
Explorer

Thanks @gcusello , I have parsed the log line and made it work.

0 Karma

gcusello
SplunkTrust
SplunkTrust

Hi @dujas,

good for you, see next time!

Ciao and happy splunking

Giuseppe

P.S.: Karma Points are appreciated 😉

0 Karma
Get Updates on the Splunk Community!

Splunk Observability Cloud's AI Assistant in Action Series: Explaining Metrics and ...

This is the fourth post in the Splunk Observability Cloud’s AI Assistant in Action series that digs into how ...

Brains, Bytes, and Boston: Learn from the Best at .conf25

When you think of Boston, you might picture colonial charm, world-class universities, or even the crack of a ...

Splunk AppDynamics Agents Webinar Series

Mark your calendars! On June 24th at 12PM PST, we’re going live with the second session of our Splunk ...