<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: How to configure a time stamp for Symantec logs to correlate log_time field instead of _time field  ? in Splunk Dev</title>
    <link>https://community.splunk.com/t5/Splunk-Dev/How-to-configure-a-time-stamp-for-Symantec-logs-to-correlate-log/m-p/304743#M3968</link>
    <description>&lt;P&gt;Try changing your MAX_TIMESTAMP_LOOKAHEAD to something crazy like 4096&lt;/P&gt;

&lt;P&gt;Do you still have this "DATETIME_CONFIG = CURRENT"&lt;/P&gt;

&lt;P&gt;If so, try changing it to DATETIME_CONFIG = NONE&lt;/P&gt;</description>
    <pubDate>Tue, 29 Sep 2020 17:06:29 GMT</pubDate>
    <dc:creator>jkat54</dc:creator>
    <dc:date>2020-09-29T17:06:29Z</dc:date>
    <item>
      <title>How to configure a time stamp for Symantec logs to correlate log_time field instead of _time field  ?</title>
      <link>https://community.splunk.com/t5/Splunk-Dev/How-to-configure-a-time-stamp-for-Symantec-logs-to-correlate-log/m-p/304718#M3943</link>
      <description>&lt;P&gt;Hi All, Currently we are facing an problem in time stamp for a Symantec log data. &lt;BR /&gt;
Problem: When we search with the below query, we could see that the splunk _time field is different from the event's "time" field.&lt;/P&gt;

&lt;P&gt;Query details: &lt;/P&gt;

&lt;P&gt;index=sem sourcetype="symantec:tap:incidents"  time="2017-08-11T05:01:38.134Z"  &lt;/P&gt;

&lt;P&gt;Event Details: &lt;/P&gt;

&lt;P&gt;Time &lt;BR /&gt;
8/24/17&lt;BR /&gt;
3:45:33.000 PM&lt;/P&gt;

&lt;P&gt;Event &lt;/P&gt;

&lt;P&gt;{   [-] &lt;BR /&gt;
     tap_host:   10.x.x.x&lt;BR /&gt;&lt;BR /&gt;
     tap_incident_id:    xxxxx&lt;BR /&gt;&lt;BR /&gt;
     deviceUid: [   [+] &lt;BR /&gt;
    ]&lt;BR /&gt;&lt;BR /&gt;
     device_time:    2017-08-11T05:01:38.134Z&lt;BR /&gt;&lt;BR /&gt;
     domainId:  [   [+] &lt;BR /&gt;
    ]&lt;BR /&gt;&lt;BR /&gt;
     event_count:    3&lt;BR /&gt;&lt;BR /&gt;
     filehash:  [   [+] &lt;BR /&gt;
    ]&lt;BR /&gt;&lt;BR /&gt;
     first_event_seen:   2017-08-11T04:41:36.000Z&lt;BR /&gt;&lt;BR /&gt;
     last_event_seen:    2017-08-11T07:18:37.211Z&lt;BR /&gt;&lt;BR /&gt;
     log_name:   exxx_incident-2017-08-11/incident&lt;BR /&gt;&lt;BR /&gt;
     priority_level:     2&lt;BR /&gt;&lt;BR /&gt;
     recommended_action:     You can isolate the endpoint(s), remove the file(s) and/or clean the system(s).&lt;BR /&gt;&lt;BR /&gt;
     state:  1&lt;BR /&gt;&lt;BR /&gt;
     summary:    xxxxxxxx.&lt;BR /&gt;&lt;BR /&gt;
     time:   2017-08-11T05:01:38.134Z&lt;BR /&gt;&lt;BR /&gt;
     updated:    2017-08-12T12:52:06.766Z&lt;BR /&gt;&lt;BR /&gt;
     uuid:   27fc1760-7e52-xxxxxx-0000000001eb  &lt;/P&gt;

&lt;P&gt;From the Event Action,  I could see that in the event time field  "2017-08-11T05:01:38.134Z"  and in the _time field as "2017-08-24T15:45:33.000-04:00"  for the same event, "_time" is not equal to "time".&lt;/P&gt;

&lt;P&gt;_time is being calculated based on when it was indexed instead of when it was an event.&lt;/P&gt;

&lt;P&gt;Question : &lt;/P&gt;

&lt;P&gt;How to make the  _time field be the same as the time field ?&lt;/P&gt;

&lt;P&gt;Kindly guide me on this. &lt;/P&gt;</description>
      <pubDate>Tue, 29 Sep 2020 15:31:32 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Dev/How-to-configure-a-time-stamp-for-Symantec-logs-to-correlate-log/m-p/304718#M3943</guid>
      <dc:creator>Hemnaath</dc:creator>
      <dc:date>2020-09-29T15:31:32Z</dc:date>
    </item>
    <item>
      <title>Re: How to configure a time stamp for Symantec logs to correlate log_time field instead of _time field  ?</title>
      <link>https://community.splunk.com/t5/Splunk-Dev/How-to-configure-a-time-stamp-for-Symantec-logs-to-correlate-log/m-p/304719#M3944</link>
      <description>&lt;P&gt;Basically, that indicates that the indexer was not able to find the time in the event. &lt;/P&gt;

&lt;P&gt;To confirm that that is what is happening, rather than a few similar things that might look like this, please run this and compare the times..&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;  index=sem sourcetype="symantec:tap:incidents"
  | head 5
  | eval indextime = strftime(_indextime, "%Y-%m-%dT%H:%M:%S")
  | table time indextime
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;If the two fields match each other  for all 5 records, then please post your props.conf  stanza for the sourcetype, and we'll help you get it figured out. &lt;/P&gt;</description>
      <pubDate>Tue, 29 Aug 2017 23:22:29 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Dev/How-to-configure-a-time-stamp-for-Symantec-logs-to-correlate-log/m-p/304719#M3944</guid>
      <dc:creator>DalJeanis</dc:creator>
      <dc:date>2017-08-29T23:22:29Z</dc:date>
    </item>
    <item>
      <title>Re: How to configure a time stamp for Symantec logs to correlate log_time field instead of _time field  ?</title>
      <link>https://community.splunk.com/t5/Splunk-Dev/How-to-configure-a-time-stamp-for-Symantec-logs-to-correlate-log/m-p/304720#M3945</link>
      <description>&lt;P&gt;Try this in props.conf on the forwarder or indexer that is first seeing the data:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;[symantec:tap:incidents]
TIME_PREFIX=time:\s
TIME_FORMAT=%FT%T.%3N
MAX_TIMESTAMP_LOOKAHEAD=32
TZ=EDT
&lt;/CODE&gt;&lt;/PRE&gt;</description>
      <pubDate>Tue, 29 Aug 2017 23:37:12 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Dev/How-to-configure-a-time-stamp-for-Symantec-logs-to-correlate-log/m-p/304720#M3945</guid>
      <dc:creator>jkat54</dc:creator>
      <dc:date>2017-08-29T23:37:12Z</dc:date>
    </item>
    <item>
      <title>Re: How to configure a time stamp for Symantec logs to correlate log_time field instead of _time field  ?</title>
      <link>https://community.splunk.com/t5/Splunk-Dev/How-to-configure-a-time-stamp-for-Symantec-logs-to-correlate-log/m-p/304721#M3946</link>
      <description>&lt;P&gt;Hi Dal Jeanis, thanks for guiding me, I had executed the query and got this output and as you said the two fields are matching all the five records. &lt;/P&gt;

&lt;P&gt;index=sem sourcetype="symantec:tap:incidents"  | head 5  | eval indextime = strftime(_indextime, "%Y-%m-%dT%H:%M:%S")  | table time indextime&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;time                                        indextime
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;2017-08-29T16:22:01.597Z    2017-08-29T12:25:44&lt;BR /&gt;
2017-08-29T15:59:59.853Z    2017-08-29T12:05:44&lt;BR /&gt;
2017-08-29T15:59:59.852Z    2017-08-29T12:05:44&lt;BR /&gt;
2017-08-29T15:59:59.852Z    2017-08-29T12:05:44&lt;BR /&gt;
2017-08-29T15:42:05.321Z    2017-08-29T11:45:44&lt;/P&gt;

&lt;P&gt;Kindly let me know what I have right in props stanza to match  the _time field to be the same as the time field in the event.&lt;/P&gt;

&lt;P&gt;Similarly i have another  sourcetype=symantec:tap:incidentevents  which is also having the same issue. in this indextime is not matching the log_time field value in the events. &lt;/P&gt;

&lt;P&gt;index=sem sourcetype=symantec:tap:incidentevents | head 5&lt;BR /&gt;
   | eval indextime = strftime(_indextime, "%Y-%m-%dT%H:%M:%S")&lt;BR /&gt;
   | table log_time indextime&lt;/P&gt;

&lt;P&gt;&lt;STRONG&gt;log_time&lt;/STRONG&gt;                                                        &lt;STRONG&gt;indextime&lt;/STRONG&gt;&lt;BR /&gt;
2017-08-29T16:40:58.819Z                         2017-08-29T12:45:43&lt;BR /&gt;
2017-08-29T16:40:58.821Z                         2017-08-29T12:45:43&lt;BR /&gt;
2017-08-29T16:40:58.800Z                         2017-08-29T12:45:43&lt;BR /&gt;
2017-08-29T16:40:58.798Z                         2017-08-29T12:45:43&lt;BR /&gt;
2017-08-29T16:40:58.778Z                     2017-08-29T12:45:43&lt;/P&gt;

&lt;P&gt;Kindly guide me on this, on how to fix this issue. &lt;/P&gt;</description>
      <pubDate>Tue, 29 Sep 2020 15:35:15 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Dev/How-to-configure-a-time-stamp-for-Symantec-logs-to-correlate-log/m-p/304721#M3946</guid>
      <dc:creator>Hemnaath</dc:creator>
      <dc:date>2020-09-29T15:35:15Z</dc:date>
    </item>
    <item>
      <title>Re: How to configure a time stamp for Symantec logs to correlate log_time field instead of _time field  ?</title>
      <link>https://community.splunk.com/t5/Splunk-Dev/How-to-configure-a-time-stamp-for-Symantec-logs-to-correlate-log/m-p/304722#M3947</link>
      <description>&lt;P&gt;Hi Jkat54, thanks for your effort on this, i had run the above query provide by Dal Jeanis and got the above output. Based on the out put can I try this above stanza will that work. Kindly guide on this, as I need to get this fixed.&lt;/P&gt;

&lt;P&gt;index=sem sourcetype="symantec:tap:incidents"  | head 5| eval indextime = strftime(_indextime, "%Y-%m-%dT%H:%M:%S")| table time indextime&lt;/P&gt;

&lt;P&gt;time&lt;BR /&gt;&lt;BR /&gt;
2017-08-29T16:22:01.597Z&lt;BR /&gt;
2017-08-29T15:59:59.853Z&lt;BR /&gt;
2017-08-29T15:59:59.852Z&lt;BR /&gt;
2017-08-29T15:59:59.852Z&lt;BR /&gt;
2017-08-29T15:42:05.321Z&lt;/P&gt;

&lt;P&gt;indextime&lt;BR /&gt;
2017-08-29T12:25:44&lt;BR /&gt;
2017-08-29T12:05:44&lt;BR /&gt;
2017-08-29T12:05:44&lt;BR /&gt;
2017-08-29T12:05:44&lt;BR /&gt;
2017-08-29T11:45:44&lt;/P&gt;

&lt;P&gt;Also we have another sourcetype=symantec:tap:incidentevents with same issue in this indextime should  match the log_time field value in the events.&lt;/P&gt;

&lt;P&gt;index=sem sourcetype=symantec:tap:incidentevents | head 5&lt;BR /&gt;
| eval indextime = strftime(_indextime, "%Y-%m-%dT%H:%M:%S")&lt;BR /&gt;
| table log_time indextime&lt;/P&gt;

&lt;P&gt;log_time indextime&lt;BR /&gt;
2017-08-29T16:40:58.819Z 2017-08-29T12:45:43&lt;BR /&gt;
2017-08-29T16:40:58.821Z 2017-08-29T12:45:43&lt;BR /&gt;
2017-08-29T16:40:58.800Z 2017-08-29T12:45:43&lt;BR /&gt;
2017-08-29T16:40:58.798Z 2017-08-29T12:45:43&lt;BR /&gt;
2017-08-29T16:40:58.778Z 2017-08-29T12:45:43&lt;/P&gt;

&lt;P&gt;Please guide me how to make the _time field be the same as the log_time field ?&lt;BR /&gt;
thanks in advance. &lt;/P&gt;</description>
      <pubDate>Tue, 29 Sep 2020 15:35:18 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Dev/How-to-configure-a-time-stamp-for-Symantec-logs-to-correlate-log/m-p/304722#M3947</guid>
      <dc:creator>Hemnaath</dc:creator>
      <dc:date>2020-09-29T15:35:18Z</dc:date>
    </item>
    <item>
      <title>Re: How to configure a time stamp for Symantec logs to correlate log_time field instead of _time field  ?</title>
      <link>https://community.splunk.com/t5/Splunk-Dev/How-to-configure-a-time-stamp-for-Symantec-logs-to-correlate-log/m-p/304723#M3948</link>
      <description>&lt;P&gt;Both are the same time_format but the time prefix is probably different.  I can't tell without sample _raw data but I assume time prefix would be log_time:\s for symantec:tap:incidentevents&lt;/P&gt;</description>
      <pubDate>Tue, 29 Sep 2020 15:35:24 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Dev/How-to-configure-a-time-stamp-for-Symantec-logs-to-correlate-log/m-p/304723#M3948</guid>
      <dc:creator>jkat54</dc:creator>
      <dc:date>2020-09-29T15:35:24Z</dc:date>
    </item>
    <item>
      <title>Re: How to configure a time stamp for Symantec logs to correlate log_time field instead of _time field  ?</title>
      <link>https://community.splunk.com/t5/Splunk-Dev/How-to-configure-a-time-stamp-for-Symantec-logs-to-correlate-log/m-p/304724#M3949</link>
      <description>&lt;P&gt;Hi Jkat, thanks for your effort on this, after executing the below query i am got this event details for a duration of 7 days &lt;/P&gt;

&lt;P&gt;index=sem sourcetype=symantec:tap:incidentevents log_time="2017-08-22T13:38:04.899Z"&lt;/P&gt;

&lt;P&gt;8/24/17&lt;BR /&gt;
3:46:06.000 PM&lt;BR /&gt;&lt;BR /&gt;
{   [-] &lt;BR /&gt;
     actual_action:  Left alone &lt;BR /&gt;
     actual_action_idx:  4&lt;BR /&gt;&lt;BR /&gt;
     agent_version:  12.1.7004.6500 &lt;BR /&gt;
     tap_host:   10.x.x.x&lt;BR /&gt;&lt;BR /&gt;
     data_source_url_domain:     xxx-my.sharepoint.com&lt;BR /&gt;&lt;BR /&gt;
     device_ip:  10.x.x.x&lt;BR /&gt;&lt;BR /&gt;
     device_name:    xxxxxx &lt;BR /&gt;
     device_time:    2017-08-22T13:32:17.000Z&lt;BR /&gt;&lt;BR /&gt;
     device_uid:     d424209e-a2fc-4956-8355-0657630e9f13&lt;BR /&gt;&lt;BR /&gt;
     domain_name:    test.com&lt;BR /&gt;&lt;BR /&gt;
     external_ip:&lt;BR /&gt;&lt;BR /&gt;
     file:  {   [+] &lt;BR /&gt;
    }&lt;BR /&gt;&lt;BR /&gt;
     host_name:  xxxxx&lt;BR /&gt;&lt;BR /&gt;
     incident:   20147330-873f-11ex-e5x8-00000000024b&lt;BR /&gt;&lt;BR /&gt;
     internal_ip:    10.x.x.x&lt;BR /&gt;&lt;BR /&gt;
     local_host_mac:     xx-8b-xx-xx-0d-xx&lt;BR /&gt;&lt;BR /&gt;
     log_name:   xxx_incident-2017-08-22/event&lt;BR /&gt;&lt;BR /&gt;
     log_time:   2017-08-22T13:38:04.899Z&lt;BR /&gt;&lt;BR /&gt;
     no_of_viruses:  1&lt;BR /&gt;&lt;BR /&gt;
     sep_installed:  true&lt;BR /&gt;&lt;BR /&gt;
     source:     Real Time Scan &lt;BR /&gt;
     threat:    {   [+] &lt;BR /&gt;
    }&lt;BR /&gt;&lt;BR /&gt;
     type_id:    4123&lt;BR /&gt;&lt;BR /&gt;
     user_name:  xxxx&lt;BR /&gt;&lt;BR /&gt;
     uuid:   204dxxx-873f-11e7-fff5-000000005819&lt;BR /&gt;&lt;BR /&gt;
     virus_def:  2017-08-22 rev. 001&lt;BR /&gt;&lt;BR /&gt;
     virus_name:     xx.Reputation.1&lt;BR /&gt;&lt;BR /&gt;
}&lt;BR /&gt;
Kindly help me on  how to make the _time field be the same as the log_time field ?&lt;/P&gt;

&lt;P&gt;thanks in advance &lt;/P&gt;</description>
      <pubDate>Tue, 29 Sep 2020 15:35:28 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Dev/How-to-configure-a-time-stamp-for-Symantec-logs-to-correlate-log/m-p/304724#M3949</guid>
      <dc:creator>Hemnaath</dc:creator>
      <dc:date>2020-09-29T15:35:28Z</dc:date>
    </item>
    <item>
      <title>Re: How to configure a time stamp for Symantec logs to correlate log_time field instead of _time field  ?</title>
      <link>https://community.splunk.com/t5/Splunk-Dev/How-to-configure-a-time-stamp-for-Symantec-logs-to-correlate-log/m-p/304725#M3950</link>
      <description>&lt;P&gt;Hi Jkat, thanks for your effort on this,  can I configure the props.conf stanza for the sourcetype=symantec:tap:incidentevents. In order to make _time field be the same as the log_time field. &lt;/P&gt;

&lt;P&gt;[symantec:tap:incidentevents]&lt;BR /&gt;
 TIME_PREFIX=log_time:\s&lt;BR /&gt;
 TIMESTAMP_FORMAT=%FT%T.%3N&lt;BR /&gt;
 MAX_TIMESTAMP_LOOKAHEAD=32&lt;BR /&gt;
 TZ=EDT&lt;/P&gt;

&lt;P&gt;thanks in advance.&lt;/P&gt;</description>
      <pubDate>Tue, 29 Sep 2020 15:35:36 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Dev/How-to-configure-a-time-stamp-for-Symantec-logs-to-correlate-log/m-p/304725#M3950</guid>
      <dc:creator>Hemnaath</dc:creator>
      <dc:date>2020-09-29T15:35:36Z</dc:date>
    </item>
    <item>
      <title>Re: How to configure a time stamp for Symantec logs to correlate log_time field instead of _time field  ?</title>
      <link>https://community.splunk.com/t5/Splunk-Dev/How-to-configure-a-time-stamp-for-Symantec-logs-to-correlate-log/m-p/304726#M3951</link>
      <description>&lt;P&gt;Yes but the props must be on the first Splunk that sees the data . such as the forwarder.&lt;/P&gt;</description>
      <pubDate>Thu, 31 Aug 2017 20:08:37 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Dev/How-to-configure-a-time-stamp-for-Symantec-logs-to-correlate-log/m-p/304726#M3951</guid>
      <dc:creator>jkat54</dc:creator>
      <dc:date>2017-08-31T20:08:37Z</dc:date>
    </item>
    <item>
      <title>Re: How to configure a time stamp for Symantec logs to correlate log_time field instead of _time field  ?</title>
      <link>https://community.splunk.com/t5/Splunk-Dev/How-to-configure-a-time-stamp-for-Symantec-logs-to-correlate-log/m-p/304727#M3952</link>
      <description>&lt;P&gt;thanks Jkat. &lt;/P&gt;</description>
      <pubDate>Thu, 31 Aug 2017 20:36:17 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Dev/How-to-configure-a-time-stamp-for-Symantec-logs-to-correlate-log/m-p/304727#M3952</guid>
      <dc:creator>Hemnaath</dc:creator>
      <dc:date>2017-08-31T20:36:17Z</dc:date>
    </item>
    <item>
      <title>Re: How to configure a time stamp for Symantec logs to correlate log_time field instead of _time field  ?</title>
      <link>https://community.splunk.com/t5/Splunk-Dev/How-to-configure-a-time-stamp-for-Symantec-logs-to-correlate-log/m-p/304728#M3953</link>
      <description>&lt;P&gt;Jkat,  when checked for the props stanza in the Heavy forwarder, I could see the below stanza details for this app and I have added the your stanza along with this stanza. So that fine to push it and restart the service to match the _time field be the same as the time field.&lt;/P&gt;

&lt;P&gt;[symantec:tap:incidents]&lt;BR /&gt;
SHOULD_LINEMERGE = false&lt;BR /&gt;
FIELDALIAS-event_host = tap_host as event_host&lt;BR /&gt;
FIELDALIAS-dest = domainId{} as dest&lt;BR /&gt;
FIELDALIAS-file_hash = filehash{} as file_hash&lt;BR /&gt;
FIELDALIAS-severity_id = priority_level as severity_id&lt;BR /&gt;
DATETIME_CONFIG = CURRENT&lt;BR /&gt;
KV_MODE = json&lt;BR /&gt;
TRUNCATE = 0&lt;BR /&gt;
TIME_PREFIX=time:\s&lt;BR /&gt;
TIMESTAMP_FORMAT=%FT%T.%3N&lt;BR /&gt;
MAX_TIMESTAMP_LOOKAHEAD=32&lt;BR /&gt;
TZ=EDT &lt;/P&gt;

&lt;P&gt;thanks in advances. &lt;/P&gt;</description>
      <pubDate>Tue, 29 Sep 2020 15:35:57 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Dev/How-to-configure-a-time-stamp-for-Symantec-logs-to-correlate-log/m-p/304728#M3953</guid>
      <dc:creator>Hemnaath</dc:creator>
      <dc:date>2020-09-29T15:35:57Z</dc:date>
    </item>
    <item>
      <title>Re: How to configure a time stamp for Symantec logs to correlate log_time field instead of _time field  ?</title>
      <link>https://community.splunk.com/t5/Splunk-Dev/How-to-configure-a-time-stamp-for-Symantec-logs-to-correlate-log/m-p/304729#M3954</link>
      <description>&lt;P&gt;Remove the datetime config like this if you want all data to be EDT:&lt;/P&gt;

&lt;P&gt;[symantec:tap:incidents]&lt;BR /&gt;
SHOULD_LINEMERGE = false&lt;BR /&gt;
FIELDALIAS-event_host = tap_host as event_host&lt;BR /&gt;
FIELDALIAS-dest = domainId{} as dest&lt;BR /&gt;
FIELDALIAS-file_hash = filehash{} as file_hash&lt;BR /&gt;
FIELDALIAS-severity_id = priority_level as severity_id&lt;BR /&gt;
KV_MODE = json&lt;BR /&gt;
TRUNCATE = 0&lt;BR /&gt;
TIME_PREFIX=time:\s&lt;BR /&gt;
TIME_FORMAT=%FT%T.%3N&lt;BR /&gt;
MAX_TIMESTAMP_LOOKAHEAD=32&lt;BR /&gt;
TZ=EDT&lt;/P&gt;</description>
      <pubDate>Tue, 29 Sep 2020 15:36:00 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Dev/How-to-configure-a-time-stamp-for-Symantec-logs-to-correlate-log/m-p/304729#M3954</guid>
      <dc:creator>jkat54</dc:creator>
      <dc:date>2020-09-29T15:36:00Z</dc:date>
    </item>
    <item>
      <title>Re: How to configure a time stamp for Symantec logs to correlate log_time field instead of _time field  ?</title>
      <link>https://community.splunk.com/t5/Splunk-Dev/How-to-configure-a-time-stamp-for-Symantec-logs-to-correlate-log/m-p/304730#M3955</link>
      <description>&lt;P&gt;Hi Jkat54, After updating the above stanza i am getting this error after updating the above stanza.&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;Checking conf files for problems...
            Invalid key in stanza [symantec:tap:incidents] in /opt/splunk/etc/apps/TA-symantec_tap/default/props.conf, line 83: TIMESTAMP_FORMAT (value: %FT%T.%3N).
            Invalid key in stanza [symantec:tap:incidentevents] in /opt/splunk/etc/apps/TA-symantec_tap/default/props.conf, line 100: TIMESTAMP_FORMAT (value: %FT%T.%3N).
            Your indexes and inputs configurations are not internally consistent. For more information, run 'splunk btool check --debug'
                    Bad strptime format value: '%Y-%m-%dT%H:%M:%S.%L%z', of param: props.conf / [oracle:auth:ovd] / TIME_FORMAT
            One or more time-format strings in your configuration are not valid. For details, please see btool.log or directly above.
    Done
    Checking default conf files for edits...
    Validating installed files against hashes from '/opt/splunk/splunk-6.6.1-aeae3fe0c5af-linux-2.6-x86_64-manifest'
    All installed files intact.
    Done
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;Kindly guide me on this please. &lt;/P&gt;</description>
      <pubDate>Wed, 06 Sep 2017 13:13:51 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Dev/How-to-configure-a-time-stamp-for-Symantec-logs-to-correlate-log/m-p/304730#M3955</guid>
      <dc:creator>Hemnaath</dc:creator>
      <dc:date>2017-09-06T13:13:51Z</dc:date>
    </item>
    <item>
      <title>Re: How to configure a time stamp for Symantec logs to correlate log_time field instead of _time field  ?</title>
      <link>https://community.splunk.com/t5/Splunk-Dev/How-to-configure-a-time-stamp-for-Symantec-logs-to-correlate-log/m-p/304731#M3956</link>
      <description>&lt;P&gt;Sorry, but it is TIME_FORMAT not TIMESTAMP_FORMAT.  See props.conf  (&amp;lt;- link here) for a list of valid keys.&lt;/P&gt;</description>
      <pubDate>Tue, 29 Sep 2020 15:39:30 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Dev/How-to-configure-a-time-stamp-for-Symantec-logs-to-correlate-log/m-p/304731#M3956</guid>
      <dc:creator>jkat54</dc:creator>
      <dc:date>2020-09-29T15:39:30Z</dc:date>
    </item>
    <item>
      <title>Re: How to configure a time stamp for Symantec logs to correlate log_time field instead of _time field  ?</title>
      <link>https://community.splunk.com/t5/Splunk-Dev/How-to-configure-a-time-stamp-for-Symantec-logs-to-correlate-log/m-p/304732#M3957</link>
      <description>&lt;P&gt;thanks jkart, after changing the TIMESTAMP_FORMAT to TIME_FORMAT stanza in our Heavy forwarder where the splunk sees the event first . &lt;/P&gt;

&lt;P&gt;Invalid Key Stanza got corrected.  &lt;/P&gt;

&lt;P&gt;But need to validate whether the _time field be the same as the log_time field, as we have some issue in the symantec node current we are not getting the data in splunk from this node.  &lt;/P&gt;</description>
      <pubDate>Tue, 29 Sep 2020 15:39:44 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Dev/How-to-configure-a-time-stamp-for-Symantec-logs-to-correlate-log/m-p/304732#M3957</guid>
      <dc:creator>Hemnaath</dc:creator>
      <dc:date>2020-09-29T15:39:44Z</dc:date>
    </item>
    <item>
      <title>Re: How to configure a time stamp for Symantec logs to correlate log_time field instead of _time field  ?</title>
      <link>https://community.splunk.com/t5/Splunk-Dev/How-to-configure-a-time-stamp-for-Symantec-logs-to-correlate-log/m-p/304733#M3958</link>
      <description>&lt;P&gt;@Hemnaath - Did you ever get your question answered, or do you still need help on this?&lt;/P&gt;</description>
      <pubDate>Fri, 06 Oct 2017 20:19:14 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Dev/How-to-configure-a-time-stamp-for-Symantec-logs-to-correlate-log/m-p/304733#M3958</guid>
      <dc:creator>DalJeanis</dc:creator>
      <dc:date>2017-10-06T20:19:14Z</dc:date>
    </item>
    <item>
      <title>Re: How to configure a time stamp for Symantec logs to correlate log_time field instead of _time field  ?</title>
      <link>https://community.splunk.com/t5/Splunk-Dev/How-to-configure-a-time-stamp-for-Symantec-logs-to-correlate-log/m-p/304734#M3959</link>
      <description>&lt;P&gt;Hi Dal Jeanis, thanks for asking, hey currently the tap application having some issue, so working with the application vendor. &lt;/P&gt;</description>
      <pubDate>Mon, 09 Oct 2017 14:03:04 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Dev/How-to-configure-a-time-stamp-for-Symantec-logs-to-correlate-log/m-p/304734#M3959</guid>
      <dc:creator>Hemnaath</dc:creator>
      <dc:date>2017-10-09T14:03:04Z</dc:date>
    </item>
    <item>
      <title>Re: How to configure a time stamp for Symantec logs to correlate log_time field instead of _time field  ?</title>
      <link>https://community.splunk.com/t5/Splunk-Dev/How-to-configure-a-time-stamp-for-Symantec-logs-to-correlate-log/m-p/304735#M3960</link>
      <description>&lt;P&gt;Hi Jkat54, after making the above changes we are still facing the same issue unable to fix the time stamp issue. &lt;/P&gt;

&lt;P&gt;Problem: When we search with the below query, we could see that the splunk _time field is different from the event's "time" field.&lt;/P&gt;

&lt;P&gt;Query details:&lt;/P&gt;

&lt;P&gt;index=sem sourcetype="symantec:tap:incidents" time="2017-12-05T01:37:08.048Z"&lt;/P&gt;

&lt;P&gt;Event details:&lt;/P&gt;

&lt;P&gt;12/4/17&lt;BR /&gt;
8:38:18.000 PM&lt;BR /&gt;&lt;BR /&gt;
{   [-] &lt;BR /&gt;
     tap_host:   10.X.X.X&lt;BR /&gt;&lt;BR /&gt;
     tap_incident_id:    104651 &lt;BR /&gt;
     deviceUid: [   [+] &lt;BR /&gt;
    ]&lt;BR /&gt;&lt;BR /&gt;
     device_time:    2017-12-05T01:37:08.048Z&lt;BR /&gt;&lt;BR /&gt;
     domainId:  [   [+] &lt;BR /&gt;
    ]&lt;BR /&gt;&lt;BR /&gt;
     event_count:    1&lt;BR /&gt;&lt;BR /&gt;
     filehash:  [   [+] &lt;BR /&gt;
    ]&lt;BR /&gt;&lt;BR /&gt;
     first_event_seen:   2017-12-05T01:31:24.000Z&lt;BR /&gt;&lt;BR /&gt;
     last_event_seen:    2017-12-05T01:33:12.000Z&lt;BR /&gt;&lt;BR /&gt;
     log_name:   epmp_incident-2017-12-05/incident&lt;BR /&gt;&lt;BR /&gt;
     priority_level:     2&lt;BR /&gt;&lt;BR /&gt;
     recommended_action:     Review the SEP settings, isolate the endpoint(s), remove the file(s), and/or clean the system(s).&lt;BR /&gt;&lt;BR /&gt;
     state:  1&lt;BR /&gt;&lt;BR /&gt;
     summary:    Daily unresolved SEP detection(s)&lt;BR /&gt;&lt;BR /&gt;
     time:   2017-12-05T01:37:08.048Z&lt;BR /&gt;&lt;BR /&gt;
     updated:    2017-12-05T01:37:08.441Z&lt;BR /&gt;&lt;BR /&gt;
     uuid:   ce5c8d00-d95c-11e7-d251-00000000005c&lt;BR /&gt;&lt;BR /&gt;
}&lt;BR /&gt;
Show as raw text&lt;/P&gt;

&lt;P&gt;From the Event Action, I could see that in the event time field "2017-12-05T01:37:08.048Z" and in the _time field as "2017-12-04 20:38:18" for the same event, "_time" is not equal to "time".&lt;/P&gt;

&lt;P&gt;_time is being calculated based on when it was indexed instead of when it was an event.&lt;/P&gt;

&lt;P&gt;Props.conf details: We have placed this configuration in Heavy forwarder where the data first reaches the splunk then gets ingested into indexer.&lt;/P&gt;

&lt;P&gt;[symantec:tap:incidents]&lt;BR /&gt;
SHOULD_LINEMERGE = false&lt;BR /&gt;
FIELDALIAS-event_host = tap_host as event_host&lt;BR /&gt;
KV_MODE = json&lt;BR /&gt;
TRUNCATE = 0&lt;BR /&gt;
TIME_PREFIX=time:\s&lt;BR /&gt;
TIME_FORMAT=%FT%T.%3N&lt;BR /&gt;
MAX_TIMESTAMP_LOOKAHEAD=32&lt;BR /&gt;
TZ=EDT&lt;/P&gt;

&lt;P&gt;Question :&lt;/P&gt;

&lt;P&gt;How to make the _time field be the same as the time field ?&lt;/P&gt;

&lt;P&gt;Kindly guide me on this.&lt;/P&gt;</description>
      <pubDate>Tue, 29 Sep 2020 17:08:17 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Dev/How-to-configure-a-time-stamp-for-Symantec-logs-to-correlate-log/m-p/304735#M3960</guid>
      <dc:creator>Hemnaath</dc:creator>
      <dc:date>2020-09-29T17:08:17Z</dc:date>
    </item>
    <item>
      <title>Re: How to configure a time stamp for Symantec logs to correlate log_time field instead of _time field  ?</title>
      <link>https://community.splunk.com/t5/Splunk-Dev/How-to-configure-a-time-stamp-for-Symantec-logs-to-correlate-log/m-p/304736#M3961</link>
      <description>&lt;P&gt;Try changing TIME_PREFIX  to ^time:\s&lt;/P&gt;</description>
      <pubDate>Tue, 05 Dec 2017 14:13:43 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Dev/How-to-configure-a-time-stamp-for-Symantec-logs-to-correlate-log/m-p/304736#M3961</guid>
      <dc:creator>jkat54</dc:creator>
      <dc:date>2017-12-05T14:13:43Z</dc:date>
    </item>
    <item>
      <title>Re: How to configure a time stamp for Symantec logs to correlate log_time field instead of _time field  ?</title>
      <link>https://community.splunk.com/t5/Splunk-Dev/How-to-configure-a-time-stamp-for-Symantec-logs-to-correlate-log/m-p/304737#M3962</link>
      <description>&lt;P&gt;Hi jkat54, thanks for supporting me again, I will be updating the below stanza in the HF instance and restart the splunk services.&lt;/P&gt;

&lt;P&gt;[symantec:tap:incidents]&lt;BR /&gt;
SHOULD_LINEMERGE = false&lt;BR /&gt;
FIELDALIAS-event_host = tap_host as event_host&lt;BR /&gt;
KV_MODE = json&lt;BR /&gt;
TRUNCATE = 0&lt;BR /&gt;
TIME_PREFIX=^time:\s&lt;BR /&gt;
TIME_FORMAT=%FT%T.%3N&lt;BR /&gt;
MAX_TIMESTAMP_LOOKAHEAD=32&lt;BR /&gt;
TZ=EDT&lt;/P&gt;</description>
      <pubDate>Tue, 29 Sep 2020 17:08:35 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Dev/How-to-configure-a-time-stamp-for-Symantec-logs-to-correlate-log/m-p/304737#M3962</guid>
      <dc:creator>Hemnaath</dc:creator>
      <dc:date>2020-09-29T17:08:35Z</dc:date>
    </item>
  </channel>
</rss>

