Splunk Enterprise

How to adjust timestamp for some events sending by UF

NoSpaces
Contributor

Hello for everyone!
I have an UF installed on an MS Exchange server that sends data to the indexer layer
Search actions performed on SearchHeads
All events in the IIS file log (MS Exchange) look like this:
2023-08-22 11:16:36 172.25.57.29 POST bla bla bla...

As you see, a timestamp doesn't have any data about timezone, and on SearchHeads, I see that events are older by 3 hours than I expected to see

I read some questions and documentation about how to adjust the TImeZone and tried to set up props.conf on the UF by setting "TZ = UTC"
Also, I tried another variation, but timestamps didn't change

Another way that I tried is to use "EVAL-_time = _time + 10800"
But this attempt failed too

I think that it is a really common problem, but maybe I missed something and can't solve it. Can anyone help me with this stupid question?

Labels (1)
0 Karma

NoSpaces
Contributor

UP

0 Karma
Get Updates on the Splunk Community!

Automatic Discovery Part 1: What is Automatic Discovery in Splunk Observability Cloud ...

If you’ve ever deployed a new database cluster, spun up a caching layer, or added a load balancer, you know it ...

Real-Time Fraud Detection: How Splunk Dashboards Protect Financial Institutions

Financial fraud isn't slowing down. If anything, it's getting more sophisticated. Account takeovers, credit ...

Splunk + ThousandEyes: Correlate frontend, app, and network data to troubleshoot ...

 Are you tired of troubleshooting delays caused by siloed frontend, application, and network data? We've got a ...