Getting Data In

Delay in logs from Incapsula to S3 Bucket

brewster88
New Member

Morning Guys,

We are currently having an issue with our Incapsula WAF sending logs to our AWS s3 Bucket with a delay and hoping to use a query within Splunk to provide evidence of these delays.

So far I have got as far as the following:

index=incapsula | eval delay_sec=_indextime-_time | convert ctime(_indextime) AS indextime | eval now=now() | table _time indextime now date_zone source sourcetype host

This gives a table similar to what I am after, however Im looking for the actual time stamps (epoch) on the events as they happened and the actual time the log file arrived in the s3 bucket rather than the time the log file arrived at the index, any thoughts on how to modify this query to get the necessary information at all?

Cheers guys

0 Karma
1 Solution

woodcock
Esteemed Legend

This is not possible. You will have to build some other process in AWS to add more data and then send that to Splunk, too, and correlate it.

View solution in original post

0 Karma

woodcock
Esteemed Legend

This is not possible. You will have to build some other process in AWS to add more data and then send that to Splunk, too, and correlate it.

0 Karma
Get Updates on the Splunk Community!

Upcoming Webinar: Unmasking Insider Threats with Slunk Enterprise Security’s UEBA

Join us on Wed, Dec 10. at 10AM PST / 1PM EST for a live webinar and demo with Splunk experts! Discover how ...

.conf25 technical session recap of Observability for Gen AI: Monitoring LLM ...

If you’re unfamiliar, .conf is Splunk’s premier event where the Splunk community, customers, partners, and ...

A Season of Skills: New Splunk Courses to Light Up Your Learning Journey

There’s something special about this time of year—maybe it’s the glow of the holidays, maybe it’s the ...