Getting Data In

Need help on Timestamp extraction while parsing the log data at Indexer

maniu1609
Path Finder

I have a log file to be monitored and i need to extract timestamp.
Example events:
Fri Feb 02 2018 10:22:37 aaaaaaa bbbbbbb cccccc
Mon Feb 05 2018 11:00:50 gggggg aaaaaaa vvvvvv

Please help me how I can extract timestamp of the events. Thanks in advance!!

0 Karma
1 Solution

TISKAR
Builder

Hello you can use that in props.conf,

[ __auto__learned__ ]
SHOULD_LINEMERGE=true
NO_BINARY_CHECK=true
TIME_FORMAT=%b %d %Y %H:%M:%S
TIME_PREFIX=\w{3}\s

View solution in original post

TISKAR
Builder

Hello you can use that in props.conf,

[ __auto__learned__ ]
SHOULD_LINEMERGE=true
NO_BINARY_CHECK=true
TIME_FORMAT=%b %d %Y %H:%M:%S
TIME_PREFIX=\w{3}\s

maniu1609
Path Finder

Hi Tiskar,

Thanks for your time. May I know what's the use of SHOULD_LINEMERGE and NO_BINARY_CHECK.
I have gone through the splunk documents but unable to understand them. Can you please give me some examples to understand.

0 Karma

TISKAR
Builder

Hi,
Yes, A binary file is a file whose content must be interpreted by a program or a hardware processor that understands in advance exactly how it is formatted LIKE file.exe.
So When set NO_BINARY_CHECK to true, Splunk processes binary files.

0 Karma
Get Updates on the Splunk Community!

The OpenTelemetry Certified Associate (OTCA) Exam

What’s this OTCA exam? The Linux Foundation offers the OpenTelemetry Certified Associate (OTCA) credential to ...

From Manual to Agentic: Level Up Your SOC at Cisco Live

Welcome to the Era of the Agentic SOC   Are you tired of being a manual alert responder? The security ...

Splunk Classroom Chronicles: Training Tales and Testimonials (Episode 4)

Welcome back to Splunk Classroom Chronicles, our ongoing series where we shine a light on what really happens ...