Splunk Search

Why is data extraction showing different time formats?

priya1926
Path Finder

In the query  _time is already formatted. But when i try to export the data in csv its showing different formats. 

Query:

index="win event" host IN (USMDCKPAP30074) Event=6006 OR Event="6005" Type=Information
| eval Uptime = if(Event=6005,strftime(_time, "%Y-%d-%m %H:%M:%S"),null())
| table host Uptime

Eg:

2022-31-01 10:00:42
2022-29-01 06:40:11
2022-27-01 12:55:56

After exporting :

8/1/2022 4:08
1/1/2022 4:03
2021-25-12 04:03:29
2021-18-12 04:02:54
2021-16-12 10:14:45
2021-16-12 10:08:21
11/12/2021 4:08
4/12/2021 4:11

 

Labels (1)
0 Karma

PickleRick
SplunkTrust
SplunkTrust

For starters, check the resulting csv file with a simple text editor and see what data you have in there. I suppose you're opening it in excel and there it looks like you're showing. Excel is notorious for raping date fields.

Get Updates on the Splunk Community!

[Puzzles] Solve, Learn, Repeat: Dynamic formatting from XML events

This challenge was first posted on Slack #puzzles channelFor a previous puzzle, I needed a set of fixed-length ...

Enter the Agentic Era with Splunk AI Assistant for SPL 1.4

  🚀 Your data just got a serious AI upgrade — are you ready? Say hello to the Agentic Era with the ...

Stronger Security with Federated Search for S3, GCP SQL & Australian Threat ...

Splunk Lantern is a Splunk customer success center that provides advice from Splunk experts on valuable data ...