auparse_get_timestamp - Linux


auparse_get_timestamp extracts the timestamp from an audit record file. It is a versatile tool for analyzing and auditing system events, enabling administrators to identify the time of specific actions and events.


auparse_get_timestamp [--timestamp-audit] [--timestamp-type=TYPE] [--timestamp-pos=POS] [--timestamp-from=[]] [--timestamp-to=[]]


  • –timestamp-audit: Use the timestamp from the audit record itself (default).
  • –timestamp-type=TYPE: Specify the type of timestamp to extract:
    • sec: Seconds since the epoch.
    • usec: Microseconds since the epoch.
    • nsec: Nanoseconds since the epoch.
    • relative: Seconds since the start of the audit session.
    • none: Do not extract a timestamp.
  • –timestamp-pos=POS: Position of the timestamp in the audit record.
  • –timestamp-from=[]: Start date for extracting timestamps in the format YYYY-MM-DD HH:MM:SS.
  • –timestamp-to=[]: End date for extracting timestamps in the format YYYY-MM-DD HH:MM:SS.


Extract the timestamp in seconds since the epoch:

auparse_get_timestamp \
--timestamp-type=sec \

Extract microsecond timestamps within a time range:

auparse_get_timestamp \
--timestamp-type=usec \
--timestamp-pos=22 \
--timestamp-from="2023-03-01 00:00:00" \
--timestamp-to="2023-03-01 23:59:59"

Common Issues

  • Ensure that the audit record file is in the correct format and is accessible.
  • Specify the correct timestamp type and position for the specific audit record format.
  • Use appropriate date formats when filtering timestamps.


auparse_get_timestamp can be combined with other audit analysis tools to extract and process timestamps. For example:

auparse -e user_login | \
auparse_get_timestamp --timestamp-audit

This command chain extracts login events and then obtains the timestamps from the audit records.

Related Commands

  • ausearch: Search audit records.
  • auditctl: Control the audit system.
  • aureport: Generate audit reports.