Getting Data In

Convert original log timestamp

hjwang
Contributor

The timestamp of log is 2011-06-02 06:06:45 , splunk will resolve it as 11-6-2 AM 06:06:45.000. But this is UTC time. now I wanna convert to local time as +8 hour in Asia/Taipei timezone and add

[tcp::port] || [sourcetype] || [host::$hostname]
TZ = Asia/Taipei

either in inputs.conf and apps/$appsname/local/props.conf. But it seems not to work. anything i set wrong? thanks a lot!!

Tags (1)
0 Karma

mw
Splunk Employee
Splunk Employee

TZ settings will need to go into the props.conf on the parsing server. Reference this in order to figure out where to make the config change, as it depends on your architecture: http://www.splunk.com/wiki/Where_do_I_configure_my_Splunk_settings%3F

0 Karma
Get Updates on the Splunk Community!

SOCin’ it to you at Splunk University

Splunk University is expanding its instructor-led learning portfolio with dedicated Security tracks at .conf25 ...

Credit Card Data Protection & PCI Compliance with Splunk Edge Processor

Organizations handling credit card transactions know that PCI DSS compliance is both critical and complex. The ...

Stay Connected: Your Guide to July Tech Talks, Office Hours, and Webinars!

What are Community Office Hours?Community Office Hours is an interactive 60-minute Zoom series where ...