Splunk Search

date_* fields are being duplicated when only one timestamp exists in record

bnolen
Path Finder

Hi All,

I have a situation where the date_* fields are being duplicated.

This is affecting all events that come from my heavy forwarder to my indexer.

Example screencap below:

Screen Shot showing duplication

0 Karma

woodcock
Esteemed Legend

This is surely a bug and certainly fixed by now.

0 Karma

bnolen
Path Finder

if it makes any difference/help:

forwarder version: 4.1.3 build 80534
indexer version: 4.1.4 build 82143

0 Karma

southeringtonp
Motivator

Not sure of the cause, but interesting that the date_zone is showing up with two different values...

0 Karma

bnolen
Path Finder

The search was just:

  • | table time, date*

with the time range restricted to one minute worth of logs.

0 Karma

Lowell
Super Champion

Can you provide the search that you used in the above example. I suspect this will need to be sent to splunk support.

0 Karma
Get Updates on the Splunk Community!

Splunk Observability for AI

Don’t miss out on an exciting Tech Talk on Splunk Observability for AI! Discover how Splunk’s agentic AI ...

[Puzzles] Solve, Learn, Repeat: Dereferencing XML to Fixed-length events

This challenge was first posted on Slack #puzzles channelFor a previous puzzle, I needed a set of fixed-length ...

Stay Connected: Your Guide to December Tech Talks, Office Hours, and Webinars!

What are Community Office Hours? Community Office Hours is an interactive 60-minute Zoom series where ...