I'm attempting to locate systems that have not logged into AD for 90 days. I am using the following search;
index=foo | where lastLogonTimestamp<relative_time(now(), "-90d" ) | dedup cn | table cn,lastLogonTimestamp,operatingSystem
This does not appear to function. It returns results, however the LastLogonTimestamp field appears to return ALL dates. Reversing the query returns garbage results. Every field returned says "OptionalProperties".
If I recall, this variable is stored in some Microsoft tick time similar to epoch, however Splunk seems to display it properly in the following format;
07:44.36 PM, Sun 11/17/2013
Is Splunk automatically converting this? Do I have to define a format in order to evaluate or use a where command?