Solved

What is the Created, Access and Login fields in Drupal User Table ?

Posted on 2014-01-31
4
800 Views
Last Modified: 2014-02-20
How do I convert these integers into human readable format?
fields.JPG
fields.JPG
0
Comment
Question by:sandshakimi
  • 2
4 Comments
 
LVL 17

Expert Comment

by:nanharbison
ID: 39824406
These are timestamps, right? If you have the token module enabled, you can see how to refer to date formats in Drupal:
https://drupal.org/node/390482#drupal7tokenslist-token-date
0
 
LVL 13

Expert Comment

by:Arrow_1
ID: 39824799
These are unix timestamps representing a date and time. You can convert these into human readable formats using Drupal's format_date() function.

The 'created' timestamp represents the date and time the account was created. The 'access' timestamp represents the last time the user accessed the site. The 'login' timestamp represents the last time the user successfully completed the login process.
0
 

Author Comment

by:sandshakimi
ID: 39835516
But if I want to export the User table to an .cvs file (to open in Excel), what SQL do I write so it exports readable date/time format for these fields, and not the current Unix format ?
0
 
LVL 13

Accepted Solution

by:
Arrow_1 earned 500 total points
ID: 39837386
0

Featured Post

PRTG Network Monitor: Intuitive Network Monitoring

Network Monitoring is essential to ensure that computer systems and network devices are running. Use PRTG to monitor LANs, servers, websites, applications and devices, bandwidth, virtual environments, remote systems, IoT, and many more. PRTG is easy to set up & use.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

As a database administrator, you may need to audit your table(s) to determine whether the data types are optimal for your real-world data needs.  This Article is intended to be a resource for such a task. Preface The other day, I was involved …
When table data gets too large to manage or queries take too long to execute the solution is often to buy bigger hardware or assign more CPUs and memory resources to the machine to solve the problem. However, the best, cheapest and most effective so…
Microsoft Active Directory, the widely used IT infrastructure, is known for its high risk of credential theft. The best way to test your Active Directory’s vulnerabilities to pass-the-ticket, pass-the-hash, privilege escalation, and malware attacks …

840 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question