Getting Data In

Timeparsing issues

walsborn
Path Finder

Hello all,

I'm having a time parsing issue that I don't know how to fix and am looking for some help.

My inputs on the syslog looks like this:

[monitor]
index = *
no_appending_timestamp = true
host_segment = 5
disabled = false

My Props for this source type is configured by a TA.  But the problem I'm having in the logs were from changes in our syslog system.

The new log looks like Dec 14 08:50:19 bxxm-itb.net.xxx.xxx 1,2021/12/14 08:50:18,

How do I configure props to tell splunk to ignore the first timestamp, skip the host fqdn and then parse the second time?

Labels (4)
0 Karma
1 Solution

gcusello
SplunkTrust
SplunkTrust

Hi @walsborn,

you have to add to your props.conf the following options:

[your_sourcetype]
TIME_PREFIX = ,
TIME_FORMAT = %Y/%m/%d %H:%M:%S

Ciao.

Giuseppe

View solution in original post

walsborn
Path Finder

That did it @gcusello , thank you.

0 Karma

gcusello
SplunkTrust
SplunkTrust

Hi @walsborn,

you have to add to your props.conf the following options:

[your_sourcetype]
TIME_PREFIX = ,
TIME_FORMAT = %Y/%m/%d %H:%M:%S

Ciao.

Giuseppe

Career Survey
First 500 qualified respondents will receive a $20 gift card! Tell us about your professional Splunk journey.
Get Updates on the Splunk Community!

Tech Talk Recap | Mastering Threat Hunting

Mastering Threat HuntingDive into the world of threat hunting, exploring the key differences between ...

Splunk AI Assistant for SPL vs. ChatGPT: Which One is Better?

In the age of AI, every tool promises to make our lives easier. From summarizing content to writing code, ...

Data Persistence in the OpenTelemetry Collector

This blog post is part of an ongoing series on OpenTelemetry. What happens if the OpenTelemetry collector ...