Splunk Search

How can I subtract 2 times together/why won't the search string I'm trying work?

sdorich
Communicator

So I have seen an answer related to this question on Splunk Answers but the answer that was given is not working for me. I have tried the following as my search string and it seems like mktime() is having trouble converting the human readable time I've provided to epoch time.

eventtype=bsm_events | convert mktime(event.time_received_label) as t2 mktime(event.time_created_label) as t1 | eval elapsed = t2-t1 | table t1,t2,elapsed

I've tried mktime() with 2 separate time formats.

  1. 2014-02-18T21:09:24.804-07:00
  2. 02/18/2014 9:09:24 PM

I've also tried using strptime() but had issues with that too.

Thanks in advanced.

0 Karma
1 Solution

somesoni2
Revered Legend

The correct syntax is '| convert timeformat="specify time format present in your field" mktime(yourfield) as fieldalias"'.

View solution in original post

somesoni2
Revered Legend

here you go.

0 Karma

sdorich
Communicator

Thanks - I knew I must have been missing something. That works! You should make your comment as an answer so I can mark this question as answered.

somesoni2
Revered Legend

The correct syntax is '| convert timeformat="specify time format present in your field" mktime(yourfield) as fieldalias"'.

Get Updates on the Splunk Community!

Detecting Remote Code Executions With the Splunk Threat Research Team

WATCH NOWRemote code execution (RCE) vulnerabilities pose a significant risk to organizations. If exploited, ...

Enter the Splunk Community Dashboard Challenge for Your Chance to Win!

The Splunk Community Dashboard Challenge is underway! This is your chance to showcase your skills in creating ...

.conf24 | Session Scheduler is Live!!

.conf24 is happening June 11 - 14 in Las Vegas, and we are thrilled to announce that the conference catalog ...