Splunk Enterprise

What is the time format for epoch time with .000000 ?

mah
Builder

Hi,

I have build a report to extract several fields. 

Summary Indexing by default send result into the "stash" sourcetype. This is how splunk knows that data is already in splunk and my summary data will not be account for additional license.
But I want to change the time parameter in stash sourcetype.

I have  a field "timestamp" in my log in epoch time : I would like to index my logs with the "timestamp" field, but it does not work.

I create a props.conf in my app :

[stash]

TIME_PREFIX = timestamp\=\"
TIME_FORMAT = %s

I also tried TIMESTAMP_FIELDS = timestamp but no more result.

Example of timestamp value : 

mah_0-1616423388294.png

How can I give timestamp value in _time field ? Can you help me please ?

 

 

Labels (1)
Tags (1)
0 Karma

493669
Super Champion

@mah While Creating summary index add below eval condition to get timestamp value from timestamp fieldname-

...|eval _time=timestamp

 

0 Karma

mah
Builder

Hi @493669 ,

The problem is when I want to filter the time picker to "last 60 minutes", show me nothing because splunk indexes in UTC. 

Example value : 

_time = 3/22/21 3:10:00.000 PM

timestamp = 1616425200.000000 

Even if I add :

index=test sourcetype=stash |eval _time=timestamp

with time picker filter to "last 60 minutes", I get nothing : 

mah_0-1616427253716.png

whereas when I increase time picker to "last 4 hour", I have events on last hour :

mah_1-1616427366705.png

How can I deal with that ? 

 

0 Karma
Get Updates on the Splunk Community!

Introducing the 2024 SplunkTrust!

Hello, Splunk Community! We are beyond thrilled to announce our newest group of SplunkTrust members!  The ...

Introducing the 2024 Splunk MVPs!

We are excited to announce the 2024 cohort of the Splunk MVP program. Splunk MVPs are passionate members of ...

Splunk Custom Visualizations App End of Life

The Splunk Custom Visualizations apps End of Life for SimpleXML will reach end of support on Dec 21, 2024, ...