Splunk Enterprise

Define the best sourcetype for this timestamp

leandromatperei
Path Finder

Guys.

I have the following log that I need to index in Splunk, breaking each line, what would be the best sourcetype for this log format?

 

TIME=20201031064817502 started|src=NSS|UCPU=0|SCPU=0
TIME=20201031064817506||LUSED=1|LMAX=138|OMAX=-1|LFEAT=osr_swirec,dtmf,osr_rec_tier4|UCPU=125|SCPU=31
TIME=20201031064854505 EVNT=SWIepst|VERSION=11.0.3.2019061409|UCPU=5703|SCPU=250

 

 

The format is year, month, day, hours, minutes, seconds, mseconds 

Labels (1)
Tags (1)
0 Karma
1 Solution

isoutamo
SplunkTrust
SplunkTrust

Hi

you need to define your own sourcetype for this log format.  For time you should use in props.conf

TIME_PREFIX = TIME=
TIME_FORMAT = %Y%m%d%H%M%S%3Q

r. Ismo 

View solution in original post

0 Karma

isoutamo
SplunkTrust
SplunkTrust

Hi

you need to define your own sourcetype for this log format.  For time you should use in props.conf

TIME_PREFIX = TIME=
TIME_FORMAT = %Y%m%d%H%M%S%3Q

r. Ismo 

0 Karma
Get Updates on the Splunk Community!

Upcoming Webinar: Unmasking Insider Threats with Slunk Enterprise Security’s UEBA

Join us on Wed, Dec 10. at 10AM PST / 1PM EST for a live webinar and demo with Splunk experts! Discover how ...

.conf25 technical session recap of Observability for Gen AI: Monitoring LLM ...

If you’re unfamiliar, .conf is Splunk’s premier event where the Splunk community, customers, partners, and ...

A Season of Skills: New Splunk Courses to Light Up Your Learning Journey

There’s something special about this time of year—maybe it’s the glow of the holidays, maybe it’s the ...