I'm a new Splunk user that needs to perform some analysis on a set of logs with the following format: Status, Starttime, Endtime, JobID, ReturnCode START,2021-03-15 10:56:15, ,123, END,2021-03-15 10:56:15,2021-03-15 10:56:27,123,0 ... For a single job, there are separate START and END logs which can be paired together by matching the start time and job ID using the 'transactions' command. When indexing these logs in Splunk, we've been parsing the Starttime field (2nd comma delimited value) as our timestamp but this means that all log entries with the 'END' status have a _time field corresponding to their start time rather than their end time. This leads to some extra work when filtering entries by time or calculating duration of jobs since we have to parse the Endtime field at search time. Is there any way to add some sort of condition which allows us to index a different timestamp field depending on the 'Status' field of an individual log? (i.e. if Status=START, take _time=Starttime but if Status=END, take _time=Endtime)
... View more