<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: CSV File with 'timestamp' field - Splunk adds 'none' value in Getting Data In</title>
    <link>https://community.splunk.com/t5/Getting-Data-In/CSV-File-with-timestamp-field-Splunk-adds-none-value/m-p/488266#M83560</link>
    <description>&lt;P&gt;The column header was changed to another value, which 'solved' the problem. Surprised Splunk makes it so difficult for manipulating fields&lt;/P&gt;</description>
    <pubDate>Wed, 25 Sep 2019 04:30:22 GMT</pubDate>
    <dc:creator>krishnakesiraju</dc:creator>
    <dc:date>2019-09-25T04:30:22Z</dc:date>
    <item>
      <title>CSV File with 'timestamp' field - Splunk adds 'none' value</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/CSV-File-with-timestamp-field-Splunk-adds-none-value/m-p/488263#M83557</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;

&lt;P&gt;I am trying to ingest a CSV file using a Python script (getting it from an S3 bucket) from HF. The CSV file has a field called 'timestamp' (without the quotes). This is the timestamp when the resource snapshot was taken. The value in this filed is most of the times unique - a timestamp of &lt;STRONG&gt;&lt;EM&gt;%Y-%m-%dT%H:%M:%S.%6N&lt;/EM&gt;&lt;/STRONG&gt; format. It does not have any other value.&lt;/P&gt;

&lt;P&gt;When I ingest the file using the script or manually, I notice that Splunk is appending 'none' to the timestamp field. If I change the column header value to anything other than 'timestamp' (for ex., ts), there is no problem. Unfortunately, i do not have enough points to attach files. Below is the configuration I'm using, please let me know if I'm doing anything wrong.&lt;/P&gt;

&lt;P&gt;Splunk Enterprise version # 7.2.0&lt;/P&gt;

&lt;P&gt;&lt;STRONG&gt;props.conf&lt;/STRONG&gt;&lt;/P&gt;

&lt;P&gt;DATETIME_CONFIG = CURRENT&lt;BR /&gt;
INDEXED_EXTRACTIONS = CSV&lt;BR /&gt;
KV_MODE = none&lt;BR /&gt;
NO_BINARY_CHECK = true&lt;BR /&gt;
SHOULD_LINEMERGE = false&lt;BR /&gt;
category = Structured&lt;BR /&gt;
description = Comma-separated value format. Set header and other settings in "Delimited Settings"&lt;BR /&gt;
disabled = false&lt;BR /&gt;
pulldown_type = true&lt;/P&gt;

&lt;P&gt;Why does Splunk duplicate the ingestion - once with actual timestamp value and once with timestamp as none.&lt;/P&gt;

&lt;P&gt;I tried to change the column header (before index time) using transforms.conf but with no luck using the below config, is there something i'm missing?&lt;/P&gt;

&lt;P&gt;&lt;STRONG&gt;props.conf&lt;/STRONG&gt;&lt;/P&gt;

&lt;P&gt;DATETIME_CONFIG = CURRENT&lt;BR /&gt;
INDEXED_EXTRACTIONS = csv&lt;BR /&gt;
KV_MODE = none&lt;BR /&gt;
TRANSFORMS-rename-field = extract_csv&lt;BR /&gt;
NO_BINARY_CHECK = true&lt;BR /&gt;
SHOULD_LINEMERGE = false&lt;BR /&gt;
category = Structured&lt;BR /&gt;
description = Comma-separated value format. Set header and other settings in "Delimited Settings"&lt;BR /&gt;
disabled = false&lt;BR /&gt;
pulldown_type = true&lt;/P&gt;

&lt;P&gt;&lt;STRONG&gt;transforms.conf&lt;/STRONG&gt;&lt;BR /&gt;
[extract_csv]&lt;BR /&gt;
DELIMS = ","&lt;BR /&gt;
FIELDS="field1_timestamp","field2","field3","field4",....&lt;/P&gt;

&lt;P&gt;Thanks&lt;/P&gt;</description>
      <pubDate>Wed, 30 Sep 2020 02:18:28 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/CSV-File-with-timestamp-field-Splunk-adds-none-value/m-p/488263#M83557</guid>
      <dc:creator>krishnakesiraju</dc:creator>
      <dc:date>2020-09-30T02:18:28Z</dc:date>
    </item>
    <item>
      <title>Re: CSV File with 'timestamp' field - Splunk adds 'none' value</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/CSV-File-with-timestamp-field-Splunk-adds-none-value/m-p/488264#M83558</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;

&lt;P&gt;You are using &lt;CODE&gt;DATETIME_CONFIG = CURRENT&lt;/CODE&gt;, that's why timestamp value is none.&lt;BR /&gt;
Try removing it and add &lt;CODE&gt;TIMESTAMP_FIELDS=timestamp&lt;/CODE&gt;in your props.conf, this will extract the _time value from your CSV&lt;/P&gt;

&lt;P&gt;Reference:&lt;BR /&gt;
&lt;A href="https://docs.splunk.com/Documentation/Splunk/latest/Data/Extractfieldsfromfileswithstructureddata"&gt;https://docs.splunk.com/Documentation/Splunk/latest/Data/Extractfieldsfromfileswithstructureddata&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 20 Sep 2019 04:47:55 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/CSV-File-with-timestamp-field-Splunk-adds-none-value/m-p/488264#M83558</guid>
      <dc:creator>rupesh26</dc:creator>
      <dc:date>2019-09-20T04:47:55Z</dc:date>
    </item>
    <item>
      <title>Re: CSV File with 'timestamp' field - Splunk adds 'none' value</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/CSV-File-with-timestamp-field-Splunk-adds-none-value/m-p/488265#M83559</link>
      <description>&lt;P&gt;Hi Rupesh,&lt;BR /&gt;
Thanks for your reply, but i want the 'timestamp' field value to be different to _time when the event was indexed. That was the reason I chose DATETIME_CONFIG = CURRENT setting. I want to be able to differentiate between these 2 values - as each of these holds a significance. Let me know if my understanding is incorrect.&lt;/P&gt;

&lt;P&gt;Thanks,&lt;/P&gt;</description>
      <pubDate>Wed, 30 Sep 2020 02:18:37 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/CSV-File-with-timestamp-field-Splunk-adds-none-value/m-p/488265#M83559</guid>
      <dc:creator>krishnakesiraju</dc:creator>
      <dc:date>2020-09-30T02:18:37Z</dc:date>
    </item>
    <item>
      <title>Re: CSV File with 'timestamp' field - Splunk adds 'none' value</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/CSV-File-with-timestamp-field-Splunk-adds-none-value/m-p/488266#M83560</link>
      <description>&lt;P&gt;The column header was changed to another value, which 'solved' the problem. Surprised Splunk makes it so difficult for manipulating fields&lt;/P&gt;</description>
      <pubDate>Wed, 25 Sep 2019 04:30:22 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/CSV-File-with-timestamp-field-Splunk-adds-none-value/m-p/488266#M83560</guid>
      <dc:creator>krishnakesiraju</dc:creator>
      <dc:date>2019-09-25T04:30:22Z</dc:date>
    </item>
    <item>
      <title>Re: CSV File with 'timestamp' field - Splunk adds 'none' value</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/CSV-File-with-timestamp-field-Splunk-adds-none-value/m-p/488267#M83561</link>
      <description>&lt;P&gt;@krishnakesiraju If your problem is resolved, please accept an answer to help future readers.&lt;/P&gt;</description>
      <pubDate>Wed, 25 Sep 2019 11:01:19 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/CSV-File-with-timestamp-field-Splunk-adds-none-value/m-p/488267#M83561</guid>
      <dc:creator>richgalloway</dc:creator>
      <dc:date>2019-09-25T11:01:19Z</dc:date>
    </item>
  </channel>
</rss>

