Splunk Search

How can I subtract 2 times together/why won't the search string I'm trying work?

sdorich
Communicator

So I have seen an answer related to this question on Splunk Answers but the answer that was given is not working for me. I have tried the following as my search string and it seems like mktime() is having trouble converting the human readable time I've provided to epoch time.

eventtype=bsm_events | convert mktime(event.time_received_label) as t2 mktime(event.time_created_label) as t1 | eval elapsed = t2-t1 | table t1,t2,elapsed

I've tried mktime() with 2 separate time formats.

  1. 2014-02-18T21:09:24.804-07:00
  2. 02/18/2014 9:09:24 PM

I've also tried using strptime() but had issues with that too.

Thanks in advanced.

0 Karma
1 Solution

somesoni2
Revered Legend

The correct syntax is '| convert timeformat="specify time format present in your field" mktime(yourfield) as fieldalias"'.

View solution in original post

somesoni2
Revered Legend

here you go.

0 Karma

sdorich
Communicator

Thanks - I knew I must have been missing something. That works! You should make your comment as an answer so I can mark this question as answered.

somesoni2
Revered Legend

The correct syntax is '| convert timeformat="specify time format present in your field" mktime(yourfield) as fieldalias"'.

Get Updates on the Splunk Community!

Announcing Scheduled Export GA for Dashboard Studio

We're excited to announce the general availability of Scheduled Export for Dashboard Studio. Starting in ...

Extending Observability Content to Splunk Cloud

Watch Now!   In this Extending Observability Content to Splunk Cloud Tech Talk, you'll see how to leverage ...

More Control Over Your Monitoring Costs with Archived Metrics GA in US-AWS!

What if there was a way you could keep all the metrics data you need while saving on storage costs?This is now ...