Splunk Search

Default _time

camah4
New Member

I have an example log file with the following format:

Nov 05 10:33:37 servername applicationserver: instance,ipaddress,[05/Nov/2011:10:33:33 +0000]

I would like the second time column which contains [05/Nov/2011:10:33:33 +0000] to be column which is used for _time at index time, currently by default it uses Nov 05 10:33:37.

Any suggestion on how to tech splunk to use the alternative timestamp for _time would be appreciated.

Thanks

Tags (1)
0 Karma

tgow
Splunk Employee
Splunk Employee

Here is an example of a props.conf that could work:

[yoursourcetype]
TIME_PREFIX = ,\[
TIME_FORMAT = %d/%h/%Y:%T

You might need to change this depending on if you are using a 24-hour clock or not.

Takajian
Builder

You can extract timestamp as you want. Please see following manual. This will help your question.

http://docs.splunk.com/Documentation/Splunk/4.2.4/Data/Configuretimestamprecognition

DUThibault
Contributor

Version 4.2.4 is long dead. This link still works as of version 7.2.6 : https://docs.splunk.com/Documentation/Splunk/latest/Data/Configuretimestamprecognition

0 Karma
Get Updates on the Splunk Community!

Webinar Recap | Revolutionizing IT Operations: The Transformative Power of AI and ML ...

The Transformative Power of AI and ML in Enhancing Observability   In the realm of IT operations, the ...

.conf24 | Registration Open!

Hello, hello! I come bearing good news: Registration for .conf24 is now open!   conf is Splunk’s rad annual ...

ICYMI - Check out the latest releases of Splunk Edge Processor

Splunk is pleased to announce the latest enhancements to Splunk Edge Processor.  HEC Receiver authorization ...