Splunk Search

how to display _time

fzfeng
New Member

hello

I have tow problems

1 I export my search result to csv file

but when I open it the time just display like this

1.52E+09 how to do if I want time to display right

index=maillog I timechart span=1d,count(eval(IP=×××)) as IP1 I outputcsv IP1

2 I use this command to count the IP

but in my column chart the interval is not one day
_time display like this 3/25 3/27 3/29

how to set it like 3/25 3/26 3/27 3/28 3/29

thanks

Tags (1)
0 Karma

TISKAR
Builder

can you try this:

index=_internal  
| timechart count
| eval _time=strftime(_time,"%m/%d")
| outputcsv hola
0 Karma

HeinzWaescher
Motivator

For 1) you could use a workaround in the search and transform the _time field like this

 index=maillog 
 | timechart span=1d,count(eval(IP=×××)) as IP1
 | eval _time=strftime(_time, "%Y-%m-%d")
 | outputcsv IP1

Regarding 2), I don't understand your need here.

0 Karma

adonio
Ultra Champion

hello there,
_time is in epoch
try something like this:

index = <your_index> sourcetype=<your_sourcetype>
| bin _time span=1d 
| eval _time = strftime(_time, "%m/%d")
| stats count(eval(IP="IP1")) as IP_CSV by _time
| outputcsv IP1

hope it helps

as a side note, if you are only looking at that IP, better practice would be to filter to it first:
... your search ... IP=IP1 | ... more sstuff ... | stats count as IP1

0 Karma
Get Updates on the Splunk Community!

Building Reliable Asset and Identity Frameworks in Splunk ES

 Accurate asset and identity resolution is the backbone of security operations. Without it, alerts are ...

Cloud Monitoring Console - Unlocking Greater Visibility in SVC Usage Reporting

For Splunk Cloud customers, understanding and optimizing Splunk Virtual Compute (SVC) usage and resource ...

Automatic Discovery Part 3: Practical Use Cases

If you’ve enabled Automatic Discovery in your install of the Splunk Distribution of the OpenTelemetry ...