Getting Data In

Configure Event Timestamp

rantravee
Path Finder

Hi,

I would like to know how to configure Splunk so that for each event that I'm feeding to it the system time is used as the event timespamp.

I need to do this because the JSON objects that are fed to Splunk contain keys/value that describe the time(in millies) of some things and this makes Splunk to mismatch the event timestamps for some value that it finds within the JSON object.

Any hint would be greatly appreciated,

0 Karma
1 Solution

alacercogitatus
SplunkTrust
SplunkTrust

You can set it in props.conf. See the docs for details: http://docs.splunk.com/Documentation/Splunk/latest/admin/propsconf

props.conf
[mysourcetype]
DATETIME_CONFIG = CURRENT

View solution in original post

alacercogitatus
SplunkTrust
SplunkTrust

You can set it in props.conf. See the docs for details: http://docs.splunk.com/Documentation/Splunk/latest/admin/propsconf

props.conf
[mysourcetype]
DATETIME_CONFIG = CURRENT

rantravee
Path Finder

Worked for me. Thanks a bunch !

0 Karma
Get Updates on the Splunk Community!

Enterprise Security Content Update (ESCU) | New Releases

In December, the Splunk Threat Research Team had 1 release of new security content via the Enterprise Security ...

Why am I not seeing the finding in Splunk Enterprise Security Analyst Queue?

(This is the first of a series of 2 blogs). Splunk Enterprise Security is a fantastic tool that offers robust ...

Index This | What are the 12 Days of Splunk-mas?

December 2024 Edition Hayyy Splunk Education Enthusiasts and the Eternally Curious!  We’re back with another ...