Splunk Search

how to display _time

fzfeng
New Member

hello

I have tow problems

1 I export my search result to csv file

but when I open it the time just display like this

1.52E+09 how to do if I want time to display right

index=maillog I timechart span=1d,count(eval(IP=×××)) as IP1 I outputcsv IP1

2 I use this command to count the IP

but in my column chart the interval is not one day
_time display like this 3/25 3/27 3/29

how to set it like 3/25 3/26 3/27 3/28 3/29

thanks

Tags (1)
0 Karma

TISKAR
Builder

can you try this:

index=_internal  
| timechart count
| eval _time=strftime(_time,"%m/%d")
| outputcsv hola
0 Karma

HeinzWaescher
Motivator

For 1) you could use a workaround in the search and transform the _time field like this

 index=maillog 
 | timechart span=1d,count(eval(IP=×××)) as IP1
 | eval _time=strftime(_time, "%Y-%m-%d")
 | outputcsv IP1

Regarding 2), I don't understand your need here.

0 Karma

adonio
Ultra Champion

hello there,
_time is in epoch
try something like this:

index = <your_index> sourcetype=<your_sourcetype>
| bin _time span=1d 
| eval _time = strftime(_time, "%m/%d")
| stats count(eval(IP="IP1")) as IP_CSV by _time
| outputcsv IP1

hope it helps

as a side note, if you are only looking at that IP, better practice would be to filter to it first:
... your search ... IP=IP1 | ... more sstuff ... | stats count as IP1

0 Karma
Get Updates on the Splunk Community!

Splunk Mobile: Your Brand-New Home Screen

Meet Your New Mobile Hub  Hello Splunk Community!  Staying connected to your data—no matter where you are—is ...

Introducing Value Insights (Beta): Understand the Business Impact your organization ...

Real progress on your strategic priorities starts with knowing the business outcomes your teams are delivering ...

Enterprise Security (ES) Essentials 8.3 is Now GA — Smarter Detections, Faster ...

As of today, Enterprise Security (ES) Essentials 8.3 is now generally available, helping SOC teams simplify ...