We have a firewall sending events to a Splunk indexer via syslog, so we have a section of our inputs.conf file like this:
[tcp://<port over which syslog data is sent>]
connection_host = dns
host = <name of firewall>
index = firewall
sourcetype = syslog
The trouble is that the firewall's date and time format is a bit strange:
<nn>YYYY:MM:DD-HH:mm:ss ...
where nn
is a two or three digit number, YYYY
is the year with century, MM
is a two-digit month, DD
is a two-digit day, HH
is a two-digit hour, mm
is a two-digit minute and ss
is a two-digit second. About half the time, Splunk gets the day wrong (perhaps it thinks that the -
between the day and the hour is a subtraction?). There are also events that don't start with `` and don't include a date and time.
In order to fix the date parsing, I know I need to create an inputs.conf
file, but I'm not clear on exactly what I should be putting into it, given that not all lines start with ``. Any suggestions?
Can anything be done to correct all of the data (about a year's worth) that has had the dates parsed incorrectly?
Thanks for any suggestions!
Corrections to the above: "I know I need to create an inputs.conf
file" should be "I know I need to create a props.conf
file", and "given that not all lines start with `" should be "given that not all lines start with
Hi.
Check the timestamp recognition.
http://docs.splunk.com/Documentation/Splunk/6.2.0/Data/Configuretimestamprecognition
Bye.
I added the following section to props.conf:
[host::<name of the firewall>]
TIME_PREFIX = <\d+>
TIME_FORMAT = %Y:%m:%d-%H:%M:%S
but that didn't help. Any other ideas?
TIME_PREFIX=^\<\d+\>|^
TIME_FORMAT = %Y:%m:%d-%H:%M:%S
Try this
Nope, still doesn't work.