Splunk Search

searching of logfiles in a time-range

New Member

Dear all,

I try to search for log-files in following time-range:

Start-time: 12/25/2012:0:0:0
Finish-time: 12/26/2012:0:0:0

However I can not save my settings and get below message:
Encountered the following error while trying to update: In handler 'savedsearch': Cannot parse time argument 'dispatch.earliest_time': '12/25/2012:0:0:0

What's wrong? In which format should I give the time? Thanks in advance for your efforts!

Regards
Erol

Tags (1)
0 Karma

Splunk Employee
Splunk Employee

As a unix timestamp. If you edit it in Splunk with the dropdown, it will do the conversion for you.

Don’t Miss Global Splunk
User Groups Week!

Free LIVE events worldwide 2/8-2/12
Connect, learn, and collect rad prizes
and swag!