Splunk Dev

Ingest data into indexer which contains hourly data and Splunk only show 12 hours only

daniel_splunk
Splunk Employee
Splunk Employee

Below is the sample data and the props.conf that I used. When Splunk indexed the data, it only got 12 hours.

6:44:04 AM, Source = GetCookies, xxxxx....
6:44:05 AM, Source = IsFirstTimeUser, xxxxxx....
3:52:49 PM, Source = GetUserDetails - API,xxxxx....
3:52:52 PM, Source = GetCookies, xxxxx.....

And the props.conf that I used to parse the time.

[my_source_type] 
TIME_PREFIX=^ 
TIME_FORMAT=%H:%M:%S %p 
Tags (1)
0 Karma

daniel_splunk
Splunk Employee
Splunk Employee

Your props.conf is not correct.

TIME_FORMAT has "%H" which is the 24-hour-clock hour. Because %H explicitly defined it is a 24-hour time, the am/pm isn't used.

You need to use "%I:%M:%S" for a 12-hour time.

0 Karma
Get Updates on the Splunk Community!

New Year, New Changes for Splunk Certifications

As we embrace a new year, we’re making a small but important update to the Splunk Certification ...

Stay Connected: Your Guide to January Tech Talks, Office Hours, and Webinars!

What are Community Office Hours? Community Office Hours is an interactive 60-minute Zoom series where ...

[Puzzles] Solve, Learn, Repeat: Reprocessing XML into Fixed-Length Events

This challenge was first posted on Slack #puzzles channelFor a previous puzzle, I needed a set of fixed-length ...