Community:Search Report: How to search based on Indexed Time and define time range based on relative time of Indexed Time
From Splunk Wiki
Note: Information in this page was merged to Search Example: Index Time Vs Event Time Stamp
Sometimes events such as syslog is indexed in incorrect timestamp. And you might need to troubleshoot.
At the same time, you might need to verify there are no missing events in the incorrectly indexed events.
The following search report helps us to identify such troubleshooting.
# # Search Report # => Search by indexed time # # # How to identify events the indextime and timestamp are off (more than 1 hour=3600 sec) # source="udp:514" | eval IndexTime=_indextime | eval TimeStamp=_time | eval delta=_indextime-_time | eval Raw=_raw | where delta > 3600 | convert ctime(IndexTime) | convert ctime(TimeStamp) | table TimeStamp IndexTime delta Raw # # How to specify the timerange based on indexed time # source="udp:514" | eval IndexTime=_indextime | eval CurrentTime=now() | eval D0=relative_time(now(), "@d") | eval D1=relative_time(now(), "-1d@d") | where IndexTime < D0 | where IndexTime > D1 | eval Raw=_raw | convert ctime(IndexTime) as IndexTime01 | table IndexTime IndexTime01 Raw