Splunk Search

Default _time

camah4
New Member

I have an example log file with the following format:

Nov 05 10:33:37 servername applicationserver: instance,ipaddress,[05/Nov/2011:10:33:33 +0000]

I would like the second time column which contains [05/Nov/2011:10:33:33 +0000] to be column which is used for _time at index time, currently by default it uses Nov 05 10:33:37.

Any suggestion on how to tech splunk to use the alternative timestamp for _time would be appreciated.

Thanks

Tags (1)
0 Karma

tgow
Splunk Employee
Splunk Employee

Here is an example of a props.conf that could work:

[yoursourcetype]
TIME_PREFIX = ,\[
TIME_FORMAT = %d/%h/%Y:%T

You might need to change this depending on if you are using a 24-hour clock or not.

Takajian
Builder

You can extract timestamp as you want. Please see following manual. This will help your question.

http://docs.splunk.com/Documentation/Splunk/4.2.4/Data/Configuretimestamprecognition

DUThibault
Contributor

Version 4.2.4 is long dead. This link still works as of version 7.2.6 : https://docs.splunk.com/Documentation/Splunk/latest/Data/Configuretimestamprecognition

0 Karma
Get Updates on the Splunk Community!

Unlock Database Monitoring with Splunk Observability Cloud

In today’s fast-paced digital landscape, even minor database slowdowns can disrupt user experiences and stall ...

Print, Leak, Repeat: UEBA Insider Threats You Can't Ignore

Are you ready to uncover the threats hiding in plain sight? Join us for "Print, Leak, Repeat: UEBA Insider ...

Splunk MCP & Agentic AI: Machine Data Without Limits

  Discover how the Splunk Model Context Protocol (MCP) Server can revolutionize the way your organization ...