Splunk® Enterprise

Search Manual

Acrobat logo Download manual as PDF

Splunk Enterprise version 7.3 is no longer supported as of October 22, 2021. See the Splunk Software Support Policy for details. For information about upgrading to a supported version, see How to upgrade Splunk Enterprise.
Acrobat logo Download topic as PDF

About searching with time

You can use time to narrow your search and to group events in your search by time.

How timestamps are used

Timestamp processing is a key step in event processing. Splunk software uses timestamps to:

  • Correlate events by time
  • Create the timeline histogram in Splunk Web
  • Set time ranges for searches

Splunk software adds timestamps to events at index time. Timestamp values are assigned automatically by using information that the software finds in the raw event data. See How timestamp assignment works in Getting Data In.

Timestamp formats

Splunk software sometimes represents time in UNIX time. Time represented this way appears as a series of numbers, for example 1518632124. You can use any UNIX time converter to convert the UNIX time to either GMT or your local time.

The _time field

The _time field is in UNIX time. In Splunk Web, the _time field appears in a human readable format in the UI. However, the values in the _time field are stored in UNIX time.

Specify narrow time ranges

When you start a new search, the default time range is Last 24 hours. This range helps to avoid running searches with overly-broad time ranges that waste system resources and produce more results than you really need.

Whether you are running a new search, a report, or creating a dashboard, it is important to narrow the time range to only the dates or times that you really need.

Time is also crucial for determining what went wrong. You often know when something happened, if not exactly what happened. By looking at events that happened around the same time that something went wrong, can help correlate results and find the root cause of the problem.

See also

Related information
Select time ranges to apply to your search
Specify time modifiers in your search
Specify time ranges for real-time searches
Use time to find nearby events
How time zones are processed by the Splunk platform
Date and time format variables in the Search Reference
Time modifiers in the Search Reference
Last modified on 05 September, 2022
Preview events
Select time ranges to apply to your search

This documentation applies to the following versions of Splunk® Enterprise: 7.0.0, 7.0.1, 7.0.2, 7.0.3, 7.0.4, 7.0.5, 7.0.6, 7.0.7, 7.0.8, 7.0.9, 7.0.10, 7.0.11, 7.0.13, 7.1.0, 7.1.1, 7.1.2, 7.1.3, 7.1.4, 7.1.5, 7.1.6, 7.1.7, 7.1.8, 7.1.9, 7.1.10, 7.2.0, 7.2.1, 7.2.2, 7.2.3, 7.2.4, 7.2.5, 7.2.6, 7.2.7, 7.2.8, 7.2.9, 7.2.10, 7.3.0, 7.3.1, 7.3.2, 7.3.3, 7.3.4, 7.3.5, 7.3.6, 7.3.7, 7.3.8, 7.3.9, 8.0.0, 8.0.1, 8.0.2, 8.0.3, 8.0.4, 8.0.5, 8.0.6, 8.0.7, 8.0.8, 8.0.9, 8.0.10, 8.1.0, 8.1.1, 8.1.2, 8.1.3, 8.1.4, 8.1.5, 8.1.6, 8.1.7, 8.1.8, 8.1.9, 8.1.10, 8.1.11, 8.1.12, 8.1.13, 8.2.0, 8.2.1, 8.2.2, 8.2.3, 8.2.4, 8.2.5, 8.2.6, 8.2.7, 8.2.8, 8.2.9, 8.2.10, 9.0.0, 9.0.1, 9.0.2, 9.0.3, 9.0.4

Was this documentation topic helpful?

You must be logged into splunk.com in order to post comments. Log in now.

Please try to keep this discussion focused on the content covered in this documentation topic. If you have a more general question about Splunk functionality or are experiencing a difficulty with Splunk, consider posting a question to Splunkbase Answers.

0 out of 1000 Characters