Getting Data In

microseconds in time range of search

my_splunk
Path Finder

Hi, i have events with microseconds in timestamp, for example 2013-02-13:22:09:43.687263.
I see that in custom time setting, in the time range picker of search app, is possible to use only milliseconds, so in my search i lose some events which have difference of microceconds in timestamp.

i have used earliest and latest time modifiers at search:

sourcetype = mysourcetype  timeformat="%Y-%m-%d:%H:%M:%S.%6N" earliest="2013-02-13:22:09:43.687223" latest="2013-02-13:22:09:43.687413"

to find events (financial transactions) between the two timestamps, but this search give me no results. In fact in search job inspector i see this:

searchEarliestTime 1360789783.687000000

searchLatestTime 1360789783.687000000

so microseconds are not used by search...

Is possible to use microseconds in time range? How?
Thanks

bshuler_splunk
Splunk Employee
Splunk Employee

I would extract the nanoseconds and then search based on them:

 | stats count |  eval text="2013-02-13:22:09:43.687223" | rex field=text "\d+\-\d+\-\d+\:\d+\:\d+\:\d+\.(?<nanoseconds>\d+)" | search nanoseconds>687222

 | stats count |  eval text="2013-02-13:22:09:43.687223" | rex field=text "\d+\-\d+\-\d+\:\d+\:\d+\:\d+\.(?<nanoseconds>\d+)" | search nanoseconds>687223
0 Karma
Get Updates on the Splunk Community!

Introducing the Splunk Community Dashboard Challenge!

Welcome to Splunk Community Dashboard Challenge! This is your chance to showcase your skills in creating ...

Get the T-shirt to Prove You Survived Splunk University Bootcamp

As if Splunk University, in Las Vegas, in-person, with three days of bootcamps and labs weren’t enough, now ...

Wondering How to Build Resiliency in the Cloud?

IT leaders are choosing Splunk Cloud as an ideal cloud transformation platform to drive business resilience,  ...