Getting Data In

Lines in log file not indexed if line has time stamp from the past

loligator
New Member

Hello all,

One of our home grown apps copies logs to a directory monitored by Splunk once a day around midnight. Splunk, however, will not index the events in the log if they contain a past time stamp. The lines in the log look similar to this:

12/18/2021,00:00:20,UDP,Rcv,10.132.133.29,app-measurement.com

 

These lines are skipped, however, if the line looks like this it will be indexed:

UDP,Rcv,10.132.133.29,app-measurement.com

 

It appears having a date and time in the log is causing the forwarder to not forward the data. 

Here's the input.conf for the Splunk app that handles the files:

[monitor://C:\Logs\CustomApp]
disabled = 0
index = customapp
sourcetype = customappevents
recursive = false
blacklist = \.tmp$
crcSalt = <SOURCE>

 

Thanks in advance!

Labels (1)
0 Karma

scelikok
SplunkTrust
SplunkTrust

Hi @loligator,

Universal Forwarder does not care if the event content. Most probably Splunk is indexing those events using the old timestamps. Since the other lines have no timestamp indexers are using current time.  

If your events has no proper timestamps, you can use DATETIME_CONFIG=CURRENT setting in your sourcetype.

You should put this setting to your indexers.

props.conf

[customappevents]
DATETIME_CONFIG = CURRENT

 

If this reply helps you an upvote and "Accept as Solution" is appreciated.
0 Karma

loligator
New Member

Hey!

Thanks for the reply. I did some further troubleshooting and here's what is happening to the events when they have the date and time attached:

\x001\x002\x00/\x002\x000\x00/\x002\x000\x002\x001\x00,\x002\x003\x00:\x004\x008\x00:\x005\x001\x00,\x00U\x00D\x00P\x00,\x00R\x00c\x00v\x00,\x001\x00.\x001\x00.\x001\x00.\x003\x00,\x00g\x00s\x00a\x00s\x00.\x00a\x00p\x00p\x00l\x00e\x00.\x00c\x00o\x00m\x00 \x00 \x00 \x00 \x00 \x00 \x00 \x00 \x00 \x00 \x00 \x00 \x00 \x00 \x00 \x00 \x00 \x00 \x00 \x00 \x00 \x00 \x00 \x00 \x00 \x00 \x00 \x00 \x00 \x00
 
This is how it's displayed and I have no idea why. 
Tags (1)
0 Karma

isoutamo
SplunkTrust
SplunkTrust

Hi

you have wrong character set in use. See more e.g. https://community.splunk.com/t5/Security/SQL-Server-ERRORLOG/m-p/103382

r. Ismo

0 Karma

loligator
New Member

Thanks I'll give this a go shortly and report back. I appreciate the help.

0 Karma
Get Updates on the Splunk Community!

Video | Welcome Back to Smartness, Pedro

Remember Splunk Community member, Pedro Borges? If you tuned into Episode 2 of our Smartness interview series, ...

Detector Best Practices: Static Thresholds

Introduction In observability monitoring, static thresholds are used to monitor fixed, known values within ...

Expert Tips from Splunk Education, Observability in Action, Plus More New Articles on ...

Splunk Lantern is a Splunk customer success center that provides advice from Splunk experts on valuable data ...