Getting Data In

microseconds in time range of search

my_splunk
Path Finder

Hi, i have events with microseconds in timestamp, for example 2013-02-13:22:09:43.687263.
I see that in custom time setting, in the time range picker of search app, is possible to use only milliseconds, so in my search i lose some events which have difference of microceconds in timestamp.

i have used earliest and latest time modifiers at search:

sourcetype = mysourcetype  timeformat="%Y-%m-%d:%H:%M:%S.%6N" earliest="2013-02-13:22:09:43.687223" latest="2013-02-13:22:09:43.687413"

to find events (financial transactions) between the two timestamps, but this search give me no results. In fact in search job inspector i see this:

searchEarliestTime 1360789783.687000000

searchLatestTime 1360789783.687000000

so microseconds are not used by search...

Is possible to use microseconds in time range? How?
Thanks

bshuler_splunk
Splunk Employee
Splunk Employee

I would extract the nanoseconds and then search based on them:

 | stats count |  eval text="2013-02-13:22:09:43.687223" | rex field=text "\d+\-\d+\-\d+\:\d+\:\d+\:\d+\.(?<nanoseconds>\d+)" | search nanoseconds>687222

 | stats count |  eval text="2013-02-13:22:09:43.687223" | rex field=text "\d+\-\d+\-\d+\:\d+\:\d+\:\d+\.(?<nanoseconds>\d+)" | search nanoseconds>687223
0 Karma
Get Updates on the Splunk Community!

Introducing the 2024 SplunkTrust!

Hello, Splunk Community! We are beyond thrilled to announce our newest group of SplunkTrust members!  The ...

Introducing the 2024 Splunk MVPs!

We are excited to announce the 2024 cohort of the Splunk MVP program. Splunk MVPs are passionate members of ...

Splunk Custom Visualizations App End of Life

The Splunk Custom Visualizations apps End of Life for SimpleXML will reach end of support on Dec 21, 2024, ...