Getting Data In

In a log file that has multiple events with the same timestamp, how can each one of these to be ingested as a separate event and insert milliseconds during the indexing time?

JJagadeesh
New Member

Hi,

I have a log file that has multiple events with the same timestamp.
Foe instance:
2018-01-06 00:24:01 - ! [476] Mail is not enabled for agent notifications - xyz
2018-01-06 00:24:01 - ! [476] Mail is not enabled for agent notifications - zbc
2018-01-06 00:24:01 - ! [476] Mail is not enabled for agent notifications - 124
2018-01-06 00:24:01 - ! [476] Mail is not enabled for agent notifications - zbc4
2018-01-06 00:24:01 - ! [476] Mail is not enabled for agent notifications - zbc45g

I would like each one of these to be ingested as a separate event. Looking at the log file there seem to be no milliseconds, how can I insert milliseconds during the indexing time?

OR is there any other way to solve this issue so that the ordering is maintained.
Thanks,
JJ

0 Karma
Get Updates on the Splunk Community!

Now Available: Cisco Talos Threat Intelligence Integrations for Splunk Security Cloud ...

At .conf24, we shared that we were in the process of integrating Cisco Talos threat intelligence into Splunk ...

Preparing your Splunk Environment for OpenSSL3

The Splunk platform will transition to OpenSSL version 3 in a future release. Actions are required to prepare ...

Easily Improve Agent Saturation with the Splunk Add-on for OpenTelemetry Collector

Agent Saturation What and Whys In application performance monitoring, saturation is defined as the total load ...