<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: one timestamp multi events in Splunk Search</title>
    <link>https://community.splunk.com/t5/Splunk-Search/one-timestamp-multi-events/m-p/563517#M196321</link>
    <description>&lt;P&gt;Hi - you have multiple events with the same timestamp because Splunk line break the events to every new line from the log you are ingesting (syslog). They all have the same timestamp because Splunk extracted those timestamps from the timestamp&amp;nbsp;&lt;EM&gt;within&amp;nbsp;&lt;/EM&gt;the log itself - in your example:&amp;nbsp;&lt;FONT face="courier new,courier"&gt;&lt;SPAN&gt;%Y-%m-%dT%H:%M:%S.%QZ&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;Can you post the Splunk search you are using in the screenshot for the results you posted? Also can you clarify more on what you are trying to achieve?&lt;/P&gt;&lt;P&gt;On another note - you have to make sure you have these configurations at index time when you want the event to have the correct timestamp:&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;props.conf&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT face="courier new,courier"&gt;[custom:sourcetype]&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT face="courier new,courier"&gt;TIME_PREFIX =&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier"&gt;MAX_TIMESTAMP_LOOKAHEAD =&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier"&gt;TIME_FORMAT =&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;If the time zone in your log is&amp;nbsp;&lt;EM&gt;different&amp;nbsp;&lt;/EM&gt;than what is on the server parsing the logs (HF/IDX), then set this to match the timezone in the log (which appears to be in UTC it looks like in your case).&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;FONT face="courier new,courier"&gt;TZ = UTC&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;I'd try to set a unique sourcetype for the syslog data you are ingesting as to not override any of the default "syslog" sourcetype configs.&lt;/P&gt;&lt;P&gt;Overall - it's best practice to have these configurations for any logs to prevent Splunk from guessing the line breaking and timestamp.&amp;nbsp;&lt;/P&gt;&lt;P class="lia-indent-padding-left-30px"&gt;&lt;FONT face="courier new,courier"&gt;TIME_PREFIX =&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier"&gt;MAX_TIMESTAMP_LOOKAHEAD =&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier"&gt;TIME_FORMAT =&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier"&gt;SHOULD_LINEMERGE = false&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier"&gt;LINE_BREAKER =&lt;/FONT&gt;&lt;/P&gt;&lt;P class="lia-indent-padding-left-30px"&gt;&lt;FONT face="courier new,courier"&gt;# Default is 10,000 but you can set higher if your log exceeds this&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier"&gt;TRUNCATE = 10000&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Mon, 16 Aug 2021 20:09:05 GMT</pubDate>
    <dc:creator>m_pham</dc:creator>
    <dc:date>2021-08-16T20:09:05Z</dc:date>
    <item>
      <title>one timestamp multi events</title>
      <link>https://community.splunk.com/t5/Splunk-Search/one-timestamp-multi-events/m-p/563450#M196292</link>
      <description>&lt;P&gt;Hi&lt;/P&gt;&lt;P&gt;In my search table are some multible events with one timestamp.&lt;/P&gt;&lt;P&gt;I need to split them.&lt;/P&gt;&lt;P&gt;&lt;SPAN class="Y2IQFc"&gt;Does somebody has any idea?&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;Thanks in advance for your help&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="search.PNG" style="width: 999px;"&gt;&lt;img src="https://community.splunk.com/t5/image/serverpage/image-id/15580i9C5E0CB1FAD3AC6B/image-size/large?v=v2&amp;amp;px=999" role="button" title="search.PNG" alt="search.PNG" /&gt;&lt;/span&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="table.PNG" style="width: 999px;"&gt;&lt;img src="https://community.splunk.com/t5/image/serverpage/image-id/15579iAC51735A8EF28246/image-size/large?v=v2&amp;amp;px=999" role="button" title="table.PNG" alt="table.PNG" /&gt;&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 16 Aug 2021 09:30:30 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/one-timestamp-multi-events/m-p/563450#M196292</guid>
      <dc:creator>gotarr</dc:creator>
      <dc:date>2021-08-16T09:30:30Z</dc:date>
    </item>
    <item>
      <title>Re: one timestamp multi events</title>
      <link>https://community.splunk.com/t5/Splunk-Search/one-timestamp-multi-events/m-p/563479#M196311</link>
      <description>&lt;P&gt;What do you mean by "split them", they are already separate events? Or, do you just want to extract fields from them? Or, do you want to tag them so they have unique ids? (Consider streamstats count as row optionally with by _time).&lt;/P&gt;</description>
      <pubDate>Mon, 16 Aug 2021 13:08:40 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/one-timestamp-multi-events/m-p/563479#M196311</guid>
      <dc:creator>ITWhisperer</dc:creator>
      <dc:date>2021-08-16T13:08:40Z</dc:date>
    </item>
    <item>
      <title>Re: one timestamp multi events</title>
      <link>https://community.splunk.com/t5/Splunk-Search/one-timestamp-multi-events/m-p/563509#M196318</link>
      <description>&lt;P&gt;In your example, you see empty values for some rows, because the one of the three events with the same timestamp has a different message format than the other two and does not contain the same fields (e.g. baddr).&amp;nbsp;&lt;/P&gt;&lt;P&gt;I think we can help better if you let us know what your expected outcome/report should look like.&lt;/P&gt;</description>
      <pubDate>Mon, 16 Aug 2021 17:52:09 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/one-timestamp-multi-events/m-p/563509#M196318</guid>
      <dc:creator>s2_splunk</dc:creator>
      <dc:date>2021-08-16T17:52:09Z</dc:date>
    </item>
    <item>
      <title>Re: one timestamp multi events</title>
      <link>https://community.splunk.com/t5/Splunk-Search/one-timestamp-multi-events/m-p/563517#M196321</link>
      <description>&lt;P&gt;Hi - you have multiple events with the same timestamp because Splunk line break the events to every new line from the log you are ingesting (syslog). They all have the same timestamp because Splunk extracted those timestamps from the timestamp&amp;nbsp;&lt;EM&gt;within&amp;nbsp;&lt;/EM&gt;the log itself - in your example:&amp;nbsp;&lt;FONT face="courier new,courier"&gt;&lt;SPAN&gt;%Y-%m-%dT%H:%M:%S.%QZ&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;Can you post the Splunk search you are using in the screenshot for the results you posted? Also can you clarify more on what you are trying to achieve?&lt;/P&gt;&lt;P&gt;On another note - you have to make sure you have these configurations at index time when you want the event to have the correct timestamp:&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;props.conf&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT face="courier new,courier"&gt;[custom:sourcetype]&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT face="courier new,courier"&gt;TIME_PREFIX =&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier"&gt;MAX_TIMESTAMP_LOOKAHEAD =&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier"&gt;TIME_FORMAT =&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;If the time zone in your log is&amp;nbsp;&lt;EM&gt;different&amp;nbsp;&lt;/EM&gt;than what is on the server parsing the logs (HF/IDX), then set this to match the timezone in the log (which appears to be in UTC it looks like in your case).&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;FONT face="courier new,courier"&gt;TZ = UTC&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;I'd try to set a unique sourcetype for the syslog data you are ingesting as to not override any of the default "syslog" sourcetype configs.&lt;/P&gt;&lt;P&gt;Overall - it's best practice to have these configurations for any logs to prevent Splunk from guessing the line breaking and timestamp.&amp;nbsp;&lt;/P&gt;&lt;P class="lia-indent-padding-left-30px"&gt;&lt;FONT face="courier new,courier"&gt;TIME_PREFIX =&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier"&gt;MAX_TIMESTAMP_LOOKAHEAD =&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier"&gt;TIME_FORMAT =&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier"&gt;SHOULD_LINEMERGE = false&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier"&gt;LINE_BREAKER =&lt;/FONT&gt;&lt;/P&gt;&lt;P class="lia-indent-padding-left-30px"&gt;&lt;FONT face="courier new,courier"&gt;# Default is 10,000 but you can set higher if your log exceeds this&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier"&gt;TRUNCATE = 10000&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 16 Aug 2021 20:09:05 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/one-timestamp-multi-events/m-p/563517#M196321</guid>
      <dc:creator>m_pham</dc:creator>
      <dc:date>2021-08-16T20:09:05Z</dc:date>
    </item>
    <item>
      <title>Re: one timestamp multi events</title>
      <link>https://community.splunk.com/t5/Splunk-Search/one-timestamp-multi-events/m-p/563587#M196345</link>
      <description>&lt;P&gt;Hi&lt;/P&gt;&lt;P&gt;Tanks for all your replys.&lt;/P&gt;&lt;P&gt;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/225168"&gt;@ITWhisperer&lt;/a&gt;&amp;nbsp; well thats right but i cant see the single logs in my table because of the same time stamp.&lt;/P&gt;&lt;P&gt;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/199268"&gt;@s2_splunk&lt;/a&gt;&amp;nbsp;my table should seperate all single logs for my dashboard. Maybe it helps if i say i need to improve the timestamps f.e. toady:05:45:03.624 --&amp;gt; 05:45:03.624xxxx&amp;nbsp; you know what i mean?&lt;/P&gt;&lt;P&gt;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/228716"&gt;@m_pham&lt;/a&gt;&amp;nbsp;i will try it give me a moment &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;My goal is it to display the search on my dashboard for my firewall guys. they want a global view of the genugate (btw the 2 firewalls log with one IP because there is only one page for the config)&lt;BR /&gt;This "global table" is for alarming and counting events.&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;The next step is to split both logs for seperate detail searches (each firewall with there own table).&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;I hope you understand my plan, sorry for my simple broken english &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="suche.PNG" style="width: 999px;"&gt;&lt;img src="https://community.splunk.com/t5/image/serverpage/image-id/15597iA1BB9AE5A3230D9C/image-size/large?v=v2&amp;amp;px=999" role="button" title="suche.PNG" alt="suche.PNG" /&gt;&lt;/span&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="table2.PNG" style="width: 999px;"&gt;&lt;img src="https://community.splunk.com/t5/image/serverpage/image-id/15596iB3EDFD8D3911156B/image-size/large?v=v2&amp;amp;px=999" role="button" title="table2.PNG" alt="table2.PNG" /&gt;&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 17 Aug 2021 06:02:34 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/one-timestamp-multi-events/m-p/563587#M196345</guid>
      <dc:creator>gotarr</dc:creator>
      <dc:date>2021-08-17T06:02:34Z</dc:date>
    </item>
    <item>
      <title>Re: one timestamp multi events</title>
      <link>https://community.splunk.com/t5/Splunk-Search/one-timestamp-multi-events/m-p/563588#M196346</link>
      <description>&lt;P&gt;ah maybe its important to say&amp;nbsp;&lt;/P&gt;&lt;P&gt;my setupup is a Index Cluster (3 indexer)&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 17 Aug 2021 06:05:10 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/one-timestamp-multi-events/m-p/563588#M196346</guid>
      <dc:creator>gotarr</dc:creator>
      <dc:date>2021-08-17T06:05:10Z</dc:date>
    </item>
    <item>
      <title>Re: one timestamp multi events</title>
      <link>https://community.splunk.com/t5/Splunk-Search/one-timestamp-multi-events/m-p/563922#M196433</link>
      <description>&lt;P&gt;Sorry&lt;/P&gt;&lt;P&gt;dont work this way for me.&lt;/P&gt;&lt;P&gt;there are these empty table slots with two or more entries behind (same time stamp)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;maybe u got any other ideas?&lt;/P&gt;</description>
      <pubDate>Thu, 19 Aug 2021 09:40:53 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/one-timestamp-multi-events/m-p/563922#M196433</guid>
      <dc:creator>gotarr</dc:creator>
      <dc:date>2021-08-19T09:40:53Z</dc:date>
    </item>
  </channel>
</rss>

