Quantcast
Channel: Latest Questions on Splunk Answers
Viewing all articles
Browse latest Browse all 13053

Active Directory LastLogonTimestamp EVAL/WHERE Date Math

$
0
0

I'm attempting to locate systems that have not logged into AD for 90 days. I am using the following search;

index=foo   | where lastLogonTimestamp<relative_time(now(), "-90d" )  | dedup cn  | table  cn,lastLogonTimestamp,operatingSystem

This does not appear to function. It returns results, however the LastLogonTimestamp field appears to return ALL dates. Reversing the query returns garbage results. Every field returned says "OptionalProperties".

If I recall, this variable is stored in some Microsoft tick time similar to epoch, however Splunk seems to display it properly in the following format;

07:44.36 PM, Sun 11/17/2013

Is Splunk automatically converting this? Do I have to define a format in order to evaluate or use a where command?


Viewing all articles
Browse latest Browse all 13053

Latest Images

Trending Articles



Latest Images