Splunk Search

extract date time from log entries

muriloalves
Explorer

I have the following log structure from which I want to index date time properly.

INFO   :20170503:11.21.54.48:XYZWX ABC123:[MESSAGE 123456]
INFO   :20170503:11.21.54.54:XYZWX ABC123:[MESSAGE 123456]
INFO   :20170503:11.21.54.60:XYZWX ABC123:[MESSAGE 123456]
WARNING:20170503:11.21.54.60:XYZWX ABC123:[MESSAGE 123456]
WARNING:20170503:11.21.54.60:XYZWX ABC123:[MESSAGE 123456]

I tried to add this to my props.conf - but cannot get this done right.

[mysourcetype]
TIME_PREFIX = :
TIME_FORMAT = %y%m%d:%H.%M.%S

I'm not really good at regex , so if you guys are able to help me I will appreciate.

Thanks,

Tags (2)
0 Karma
1 Solution

richgalloway
SplunkTrust
SplunkTrust

TIME_FORMAT doesn't use regex.

Try TIME_FORMAT = %Y%m%d:%H.%M.%S.%2N

---
If this reply helps you, Karma would be appreciated.

View solution in original post

richgalloway
SplunkTrust
SplunkTrust

TIME_FORMAT doesn't use regex.

Try TIME_FORMAT = %Y%m%d:%H.%M.%S.%2N

---
If this reply helps you, Karma would be appreciated.

muriloalves
Explorer

This is how the final solution looks like.
Thanks all for helping me to get it done.

[my_logs]
TIME_PREFIX = ^\w+\s+:
TIME_FORMAT = %Y%m%d:%H.%M.%S.%2N
MAX_TIMESTAMP_LOOKAHEAD = 20

0 Karma

somesoni2
Revered Legend

Would suggest adding this as well to your props.conf

TIME_PREFIX = ^\w+\s+\:
0 Karma

muriloalves
Explorer

this is what i setup on my props.conf on the indexer app

[my_logs]
TIME_PREFIX = ^\w+\s+:
TIME_FORMAT = %y%m%d:%H.%M.%S.%2N
MAX_TIMESTAMP_LOOKAHEAD = 20

still no luck , getting the timestamp data was indexed

0 Karma

somesoni2
Revered Legend

YOu need to use the exact string provided by @richgalloway (you're using lower-case y for year, which is used for 2 digit year, your data has 4 digit year so you should be using upper-case Y in TIME_FORMAT.

0 Karma

muriloalves
Explorer

thanks a lot for that, it was exactly it was missing.
had gone thru that mask many times and missed it.
thanks a lot guys 🙂

0 Karma
Career Survey
First 500 qualified respondents will receive a $20 gift card! Tell us about your professional Splunk journey.

Can’t make it to .conf25? Join us online!

Get Updates on the Splunk Community!

Splunkbase Unveils New App Listing Management Public Preview

Splunkbase Unveils New App Listing Management Public PreviewWe're thrilled to announce the public preview of ...

Leveraging Automated Threat Analysis Across the Splunk Ecosystem

Are you leveraging automation to its fullest potential in your threat detection strategy?Our upcoming Security ...

Can’t Make It to Boston? Stream .conf25 and Learn with Haya Husain

Boston may be buzzing this September with Splunk University and .conf25, but you don’t have to pack a bag to ...