Getting Data In

Can you help me out with the time settings in this props.conf?

daniel333
Builder

All,

So here is my log -

date="[22/Jun/2016:17:25:05 +0000]" xff="166.170.220.3" 

It's well formated. I am just not sure how to handle the ="[ component?

0 Karma
1 Solution

woodcock
Esteemed Legend

Like this:

props.conf:

TIME_PREFIX = date="\[
TIME_FORMAT = %d/%b/%Y:%H:%M:%s %z
MAX_TIMESTAMP_LOOKAHEAD = 26

View solution in original post

0 Karma

woodcock
Esteemed Legend

Like this:

props.conf:

TIME_PREFIX = date="\[
TIME_FORMAT = %d/%b/%Y:%H:%M:%s %z
MAX_TIMESTAMP_LOOKAHEAD = 26
0 Karma

daniel333
Builder

Thanks! Worked like a charm.

0 Karma

muebel
SplunkTrust
SplunkTrust

Hi daniel333, You can use TIME_PREFIX props setting to tell splunk the pattern that precedes the timestamp, i.e.

TIME_PREFIX = date="\[

You can then set the MAX_TIMESTAMP_LOOKAHEAD to match the expected number of characters, i.e.

MAX_TIMESTAMP_LOOKAHEAD = 27

This should be effective to cause splunk to correctly assign a time to the event, but if not you can use TIME_FORMAT and work out the strftime setting that matches the timestamp.

Please let me know if this answers your question!

0 Karma

splunk_force_as
Path Finder

You could edit the props.conf's following configs to handle that:

TIME_PREFIX =

MAX_TIMESTAMP_LOOKAHEAD =
TIME_FORMAT =

These can be edited under $SPLUNK_HOME/etc/system/local OR in an app under $SPLUNK_HOME/etc/apps depending on your setup.

0 Karma
Get Updates on the Splunk Community!

Preparing your Splunk Environment for OpenSSL3

The Splunk platform will transition to OpenSSL version 3 in a future release. Actions are required to prepare ...

Unleash Unified Security and Observability with Splunk Cloud Platform

     Now Available on Microsoft AzureThursday, March 27, 2025  |  11AM PST / 2PM EST | Register NowStep boldly ...

Splunk AppDynamics with Cisco Secure Application

Web applications unfortunately present a target rich environment for security vulnerabilities and attacks. ...