I was going through the Release note which was updated into Splunk Docs recently.
https://docs.splunk.com/Documentation/Splunk/latest/ReleaseNotes/FixDatetimexml2020?elqTrackId=29cfe...
It is mentioned that
Beginning on January 1, 2020, un-patched Splunk platform instances will be unable to recognize timestamps from events where the date contains a two-digit year. This means data that meets this criteria will be indexed with incorrect timestamps.
My Splunk version of Splunk Enterprise is 7.0.2
, I have checked the format of timestamp from some of the sample events which are indexing into my Splunk instances. The timestamp format of the events which are forwarded to Splunk is correct with four-digit of year. But only my Splunk is showing the timestamp of logged events in two-digit of year. Please refer the highlighted part in the screenshot Splunk_events_timestamp
Is the existing timestamp format with the events are right or should I need to modify anything to accommodate with the changes effective on January 1st 2020?
Problem as i got it is from a regex in the file on the splunk installation so splunk will not be able to read timestamps with a 20 instead of 19 in the start.
They do not have 2020 in the regex but only 2010-2019 (simplified)
Meaning that we need to update that file datetime.xml on all hosts that process data with timestamps.