Getting Data In

Time field extraction

pankajupadhyay
Path Finder

Hi,

How we can extract time from the log event and then index ?

As Splunk shows different time stamp on indexer but time stamp in log event are different.

 

Please help.

 

 

 

 

0 Karma

gcusello
SplunkTrust
SplunkTrust

Hi @pankajupadhyay,

probably Splunk cannot correctly recognize timestamps, so you have to give to Splunk some additional information, for a sourcetype:

  • TIME_FORMAT
  • TIME_PREFIX
  • MAX_TIMESTAMP_LOOKAHEAD
  • etc...

you can find more infos at https://docs.splunk.com/Documentation/Splunk/8.1.1/Data/Configuretimestamprecognition

If you share some sample of your data I could help you in this job.

Ciao.

Giuseppe

0 Karma
Get Updates on the Splunk Community!

Building Reliable Asset and Identity Frameworks in Splunk ES

 Accurate asset and identity resolution is the backbone of security operations. Without it, alerts are ...

Cloud Monitoring Console - Unlocking Greater Visibility in SVC Usage Reporting

For Splunk Cloud customers, understanding and optimizing Splunk Virtual Compute (SVC) usage and resource ...

Automatic Discovery Part 3: Practical Use Cases

If you’ve enabled Automatic Discovery in your install of the Splunk Distribution of the OpenTelemetry ...