Splunk Search

searching of logfiles in a time-range

Guven
New Member

Dear all,

I try to search for log-files in following time-range:

Start-time: 12/25/2012:0:0:0
Finish-time: 12/26/2012:0:0:0

However I can not save my settings and get below message:
Encountered the following error while trying to update: In handler 'savedsearch': Cannot parse time argument 'dispatch.earliest_time': '12/25/2012:0:0:0

What's wrong? In which format should I give the time? Thanks in advance for your efforts!

Regards
Erol

Tags (1)
0 Karma

dart
Splunk Employee
Splunk Employee

As a unix timestamp. If you edit it in Splunk with the dropdown, it will do the conversion for you.

Get Updates on the Splunk Community!

Webinar Recap | Revolutionizing IT Operations: The Transformative Power of AI and ML ...

The Transformative Power of AI and ML in Enhancing Observability   In the realm of IT operations, the ...

.conf24 | Registration Open!

Hello, hello! I come bearing good news: Registration for .conf24 is now open!   conf is Splunk’s rad annual ...

ICYMI - Check out the latest releases of Splunk Edge Processor

Splunk is pleased to announce the latest enhancements to Splunk Edge Processor.  HEC Receiver authorization ...