Getting Data In

Configure Event Timestamp

rantravee
Path Finder

Hi,

I would like to know how to configure Splunk so that for each event that I'm feeding to it the system time is used as the event timespamp.

I need to do this because the JSON objects that are fed to Splunk contain keys/value that describe the time(in millies) of some things and this makes Splunk to mismatch the event timestamps for some value that it finds within the JSON object.

Any hint would be greatly appreciated,

0 Karma
1 Solution

alacercogitatus
SplunkTrust
SplunkTrust

You can set it in props.conf. See the docs for details: http://docs.splunk.com/Documentation/Splunk/latest/admin/propsconf

props.conf
[mysourcetype]
DATETIME_CONFIG = CURRENT

View solution in original post

alacercogitatus
SplunkTrust
SplunkTrust

You can set it in props.conf. See the docs for details: http://docs.splunk.com/Documentation/Splunk/latest/admin/propsconf

props.conf
[mysourcetype]
DATETIME_CONFIG = CURRENT

rantravee
Path Finder

Worked for me. Thanks a bunch !

0 Karma
Get Updates on the Splunk Community!

AI for AppInspect

We’re excited to announce two new updates to AppInspect designed to save you time and make the app approval ...

App Platform's 2025 Year in Review: A Year of Innovation, Growth, and Community

As we step into 2026, it’s the perfect moment to reflect on what an extraordinary year 2025 was for the Splunk ...

Operationalizing Entity Risk Score with Enterprise Security 8.3+

Overview Enterprise Security 8.3 introduces a powerful new feature called “Entity Risk Scoring” (ERS) for ...