<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Missing date_* fields in Splunk Enterprise</title>
    <link>https://community.splunk.com/t5/Splunk-Enterprise/Missing-date-fields/m-p/577192#M10882</link>
    <description>&lt;P&gt;Hi,&lt;BR /&gt;&lt;BR /&gt;I have this log format on our environment :&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;2021-12-03 03:28:04.296, EVENT_TIMESTAMP="2021-12-03 03:26:38.039962 Asia/Shanghai", ACTION_NAME="LOGON", AUDIT_TYPE="Standard", RETURN_CODE="1", AUTHENTICATION_TYPE="(TYPE=(*));(CLIENT ADDRESS=((ADDRESS=(PROTOCOL=*)(HOST=1.1.1.1)(PORT=222))));", CURRENT_USER="my_own_user", DBID="0001111222", DBUSERNAME="my_own_user", INSTANCE_ID="1", OS_PROCESS="12000111", OS_USERNAME="ec2-user", SCN="900000000", SESSIONID="100000000", SYSTEM_PRIVILEGE_USED="CREATE SESSION", TERMINAL="unknown", UNIFIED_AUDIT_POLICIES="unknown", USERHOST="ec2-user", TS="2021-12-03 03:26:38"&lt;BR /&gt;&lt;BR /&gt;But it is missing the&amp;nbsp;&lt;STRONG&gt;date_hour, date_mday, date_minute, date_month, date_second, date_wday, date_year, date_zone&amp;nbsp; &lt;/STRONG&gt;fields&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;this is the &lt;STRONG&gt;PROPS.CONF&lt;/STRONG&gt;:&lt;BR /&gt;[audit_sample]&lt;BR /&gt;ANNOTATE_PUNCT = false&lt;BR /&gt;LINE_BREAKER = ([\r\n]+)&lt;BR /&gt;SHOULD_LINEMERGE = false&lt;BR /&gt;MAX_TIMESTAMP_LOOKAHEAD = 32&lt;BR /&gt;TIME_PREFIX = ^&lt;BR /&gt;TIME_FORMAT = %Y-%m-%d %H:%M:%S.%3N&lt;BR /&gt;TRUNCATE = 2000&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;i have read the&amp;nbsp;&lt;A href="https://docs.splunk.com/Documentation/Splunk/8.2.3/Knowledge/Usedefaultfields" target="_blank" rel="noopener"&gt;https://docs.splunk.com/Documentation/Splunk/8.2.3/Knowledge/Usedefaultfields&lt;/A&gt;&lt;BR /&gt;and it says that the &lt;STRONG&gt;date_*&lt;/STRONG&gt; fields are only available if the timestamp is properly extracted.&amp;nbsp;&lt;BR /&gt;Which in my case is fine&amp;nbsp; because it have the &lt;STRONG&gt;_time&lt;/STRONG&gt;&amp;nbsp;field and when i compare the &lt;STRONG&gt;_time&lt;/STRONG&gt; to the actual logs they are similar, and my props configuration is properly working.&lt;BR /&gt;&lt;BR /&gt;What might be the reason on why I'm missing those fields.&lt;/P&gt;&lt;P&gt;It is not window_event_logs&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Mon, 06 Dec 2021 03:30:18 GMT</pubDate>
    <dc:creator>jadengoho</dc:creator>
    <dc:date>2021-12-06T03:30:18Z</dc:date>
    <item>
      <title>Missing date_* fields</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise/Missing-date-fields/m-p/577192#M10882</link>
      <description>&lt;P&gt;Hi,&lt;BR /&gt;&lt;BR /&gt;I have this log format on our environment :&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;2021-12-03 03:28:04.296, EVENT_TIMESTAMP="2021-12-03 03:26:38.039962 Asia/Shanghai", ACTION_NAME="LOGON", AUDIT_TYPE="Standard", RETURN_CODE="1", AUTHENTICATION_TYPE="(TYPE=(*));(CLIENT ADDRESS=((ADDRESS=(PROTOCOL=*)(HOST=1.1.1.1)(PORT=222))));", CURRENT_USER="my_own_user", DBID="0001111222", DBUSERNAME="my_own_user", INSTANCE_ID="1", OS_PROCESS="12000111", OS_USERNAME="ec2-user", SCN="900000000", SESSIONID="100000000", SYSTEM_PRIVILEGE_USED="CREATE SESSION", TERMINAL="unknown", UNIFIED_AUDIT_POLICIES="unknown", USERHOST="ec2-user", TS="2021-12-03 03:26:38"&lt;BR /&gt;&lt;BR /&gt;But it is missing the&amp;nbsp;&lt;STRONG&gt;date_hour, date_mday, date_minute, date_month, date_second, date_wday, date_year, date_zone&amp;nbsp; &lt;/STRONG&gt;fields&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;this is the &lt;STRONG&gt;PROPS.CONF&lt;/STRONG&gt;:&lt;BR /&gt;[audit_sample]&lt;BR /&gt;ANNOTATE_PUNCT = false&lt;BR /&gt;LINE_BREAKER = ([\r\n]+)&lt;BR /&gt;SHOULD_LINEMERGE = false&lt;BR /&gt;MAX_TIMESTAMP_LOOKAHEAD = 32&lt;BR /&gt;TIME_PREFIX = ^&lt;BR /&gt;TIME_FORMAT = %Y-%m-%d %H:%M:%S.%3N&lt;BR /&gt;TRUNCATE = 2000&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;i have read the&amp;nbsp;&lt;A href="https://docs.splunk.com/Documentation/Splunk/8.2.3/Knowledge/Usedefaultfields" target="_blank" rel="noopener"&gt;https://docs.splunk.com/Documentation/Splunk/8.2.3/Knowledge/Usedefaultfields&lt;/A&gt;&lt;BR /&gt;and it says that the &lt;STRONG&gt;date_*&lt;/STRONG&gt; fields are only available if the timestamp is properly extracted.&amp;nbsp;&lt;BR /&gt;Which in my case is fine&amp;nbsp; because it have the &lt;STRONG&gt;_time&lt;/STRONG&gt;&amp;nbsp;field and when i compare the &lt;STRONG&gt;_time&lt;/STRONG&gt; to the actual logs they are similar, and my props configuration is properly working.&lt;BR /&gt;&lt;BR /&gt;What might be the reason on why I'm missing those fields.&lt;/P&gt;&lt;P&gt;It is not window_event_logs&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 06 Dec 2021 03:30:18 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise/Missing-date-fields/m-p/577192#M10882</guid>
      <dc:creator>jadengoho</dc:creator>
      <dc:date>2021-12-06T03:30:18Z</dc:date>
    </item>
  </channel>
</rss>

