Splunk Search

How to get splunk to read currect date from the event?

zyxcc
New Member

Hi,

I am new in Splunk. Now, I am facing a problem.
The date in every event is as the following:

12/10/22

The splunk cannot read the date, then it displays the time when the file creates.
I have tried to add the TIME_FORMAT = %y/%m/%d in props.conf.
But it doesn't work. Is there anything I did wrong? Any idea? Thanks.

Tags (1)
0 Karma
1 Solution

martin_mueller
SplunkTrust
SplunkTrust

I've personally had trouble with date-only "time"stamps in the past as well, and my fix was to add a bogus 00:00:00 time to the date. That way you have a much easier task of getting the event dated correctly.

This may be possible with a SEDCMD in props.conf (something along the lines of s/(\d\d\/\d\d\/\d\d)/\1 00:00:00/), but I'm not 100% certain whether it gets applied before or after timestamp parsing. You should give it a try.

View solution in original post

martin_mueller
SplunkTrust
SplunkTrust

I've personally had trouble with date-only "time"stamps in the past as well, and my fix was to add a bogus 00:00:00 time to the date. That way you have a much easier task of getting the event dated correctly.

This may be possible with a SEDCMD in props.conf (something along the lines of s/(\d\d\/\d\d\/\d\d)/\1 00:00:00/), but I'm not 100% certain whether it gets applied before or after timestamp parsing. You should give it a try.

martin_mueller
SplunkTrust
SplunkTrust

You can try the sed script I posted earlier together with the SEDCMD setting in props.conf. An in-depth documentation is here: http://docs.splunk.com/Documentation/Splunk/latest/Data/Anonymizedatausingconfigurationfiles#Through...

0 Karma

zyxcc
New Member

Yes. It works. But how to add time (00:00:00) to all the events' date? I just test for only one event.

0 Karma

DaveSavage
Builder

Zyxcc, apologies - I stand corrected (thanks martin_m).
There is a TIME_PREFIX to be found in props.conf which tells Splunk where to start matching from and another parameter MAX_TIMESTAMP_LOOKAHEAD to span how many characters it should look for a timestamp. I'd backup the file and edit a new version into your /local and try a few combinations of those.
Sorry I can't be of more help - You data example looks pretty simple unless its an extract of a larger event. P160-164 of the Splunk Data manual has more.

0 Karma

zyxcc
New Member

Don't have time. Here is the example of an event in my file.
AJOEY ,Y ,Y ,Y ,Y , ,12/10/22

The date is without time. How can the splunk read the date?
Thanks!

0 Karma

DaveSavage
Builder

Year %Y should be in upper case zyxcc, month and day are lower, hours minutes etc upper.

0 Karma

zyxcc
New Member

Yes. And there is no time, either.

0 Karma

martin_mueller
SplunkTrust
SplunkTrust

The upper case %Y does not help here, he doesn't have "2012" but only "12". That's the lowercase %y.

0 Karma

Drainy
Champion

a paste of an example event and your entire props may be helpful

0 Karma

martin_mueller
SplunkTrust
SplunkTrust

Is there a time as well?

0 Karma
Get Updates on the Splunk Community!

Introducing Splunk Enterprise 9.2

WATCH HERE! Watch this Tech Talk to learn about the latest features and enhancements shipped in the new Splunk ...

Adoption of RUM and APM at Splunk

    Unleash the power of Splunk Observability   Watch Now In this can't miss Tech Talk! The Splunk Growth ...

Routing logs with Splunk OTel Collector for Kubernetes

The Splunk Distribution of the OpenTelemetry (OTel) Collector is a product that provides a way to ingest ...