Splunk Search

The events time do not march the time field in events

perlish
Communicator

Why the time of a part of the events are different from what the time field show?
And how to set the config to make time of events right?

Tags (1)
0 Karma

pembleton
Path Finder

There are numerous answers to your question, here are some, but you should go and some more for a better understanding:

  • bad timestamp extraction
  • no timestamp extraction (splunk takes time from file date, or system time)
  • different timezone (set for the sourcetype in props.conf, you have changed time settings on the indexer system, timezone set for the user viewing the events )

martin_mueller
SplunkTrust
SplunkTrust

I'm not exactly certain if I understand your question, but it sounds like you might need this: http://docs.splunk.com/Documentation/Splunk/latest/Data/Configuretimestamprecognition

linu1988
Champion

Splunk doesn't get the event times from the logs.
You have to specify the time format explicitly to get the timing.

In props.conf

TIME_FORMAT= Log_time format e.g. y%:m%:d%
TIME_PREFIX=regex to get the time filed
MAX_TIMESTAMP_LOOKAHEAD= Specify the size of the time fields to look at

These are the most useful field to get it resolved. New index data will show the update but the old data stat as it is.

0 Karma
Get Updates on the Splunk Community!

Upcoming Webinar: Unmasking Insider Threats with Slunk Enterprise Security’s UEBA

Join us on Wed, Dec 10. at 10AM PST / 1PM EST for a live webinar and demo with Splunk experts! Discover how ...

.conf25 technical session recap of Observability for Gen AI: Monitoring LLM ...

If you’re unfamiliar, .conf is Splunk’s premier event where the Splunk community, customers, partners, and ...

A Season of Skills: New Splunk Courses to Light Up Your Learning Journey

There’s something special about this time of year—maybe it’s the glow of the holidays, maybe it’s the ...