Splunk Enterprise

How to write time format for 2022-04-07 20:40:03.360 -06:00 [XXX] XXXXX?

Hemnaath
Motivator

How to write time format for the below  event log 

2022-04-07 20:40:03.360 -06:00 [XXX] Hosting starting.
2022-04-07 20:40:03.474 -06:00 [XXX] Hosting starting.
2022-04-07 20:40:03.493 -06:00 [XXX] Hosting starting.

Getting Could not use strptime to parse the time stamp from 2022-04-07 20:40:03.360 -06:00

[Sourcetype]

SHOULD_LINEMERGE=false
LINE_BREAKER=([\r\n]+)\d+\-\d+\-\d+\s\d+\:\d+\d:\d+\.\d+\s+[^\]]+\]
NO_BINARY_CHECK=true
disabled=false
TIME_PREFIX=^
TIME_FORMAT=%Y/%m/%d %H:%M:%S.%3N %z   
MAX_TIMESTAMP_LOOKAHEAD=31

Kindly guide me to fix this time stamp issue.

Labels (2)
Tags (1)
0 Karma
1 Solution

richgalloway
SplunkTrust
SplunkTrust

You're close, but the given string doesn't use the same separators as the data.  Also, a time zone with embedded ":" needs a different format character.  Try this:

TIME_FORMAT=%Y-%m-%d %H:%M:%S.%3N %:z

   

---
If this reply helps you, Karma would be appreciated.

View solution in original post

0 Karma

richgalloway
SplunkTrust
SplunkTrust

You're close, but the given string doesn't use the same separators as the data.  Also, a time zone with embedded ":" needs a different format character.  Try this:

TIME_FORMAT=%Y-%m-%d %H:%M:%S.%3N %:z

   

---
If this reply helps you, Karma would be appreciated.
0 Karma

Hemnaath
Motivator

thanks, It fixed the error.

0 Karma
Get Updates on the Splunk Community!

Detecting Remote Code Executions With the Splunk Threat Research Team

WATCH NOWRemote code execution (RCE) vulnerabilities pose a significant risk to organizations. If exploited, ...

Enter the Splunk Community Dashboard Challenge for Your Chance to Win!

The Splunk Community Dashboard Challenge is underway! This is your chance to showcase your skills in creating ...

.conf24 | Session Scheduler is Live!!

.conf24 is happening June 11 - 14 in Las Vegas, and we are thrilled to announce that the conference catalog ...