I've got some data in below format
SI01,2019-03-14,00:01:00,line1,somedata SI02,2019-03-14,00:02:00,line2,somedata SI03,2019-03-14,00:03:00,line3,somedata
I indexed the events say at
I want to use the "indexed" time for the events and NOT the 2nd/3rd field, but Splunk automatically extracts the time from 2nd/3rd fields. in props.conf , how would i ensure Splunk uses the indexed time?
tried below config, but still doesn't work
[mysourcetype] SHOULD_LINEMERGE=false # need indextime here #TIME_FORMAT=%Y/%m/%d,%H:%M:%S #TIME_PREFIX = ^\w+, LINE_BREAKER = ([\r\n]+) #MAX_TIMESTAMP_LOOKAHEAD = 1 TRUNCATE = 50000
It is worth considering if you want to use 'CURRENT' or 'NONE'
Current will use the indextime (which is what the question asked), however in some cases you may wish to use the modified time of the file, or the time which the forwarder received the data. In these cases you may choose 'NONE'.
There could of course be a few ms-minutes between these times.