Splunk Search

_time and the timestamp in the row data are having slight variation

ethanthomas
Path Finder

I could see there is a slight difference ( in seconds - from 1 to 10) between the _time and the timestamp field in the row data. Is this expected or this should be exacty matching ? Please note that the difference is only interms of seconds . 

Is there someway to fix this issue ? What could be the reason the _time is not showing exact time as in the timestamp ? 

 

Labels (4)
Tags (2)
0 Karma

scelikok
SplunkTrust
SplunkTrust

Hi @ethanthomas,

If Splunk uses your timestamp field, it will be exactly same regardless of any latency/delay on ingestion. But it seems Splunk cannot recognize timestamp in the first 128 characters and putting its current time. 

Can you please post a sample full event?

If this reply helps you an upvote and "Accept as Solution" is appreciated.
0 Karma

scelikok
SplunkTrust
SplunkTrust

Hi @ethanthomas,

It seems Splunk is not using your timestamp field as _time during ingestion. You should check your props.conf on indexers or heavy forwarder. Be sure following are set and correct;

TIME_PREFIX

TIME_FORMAT

If this reply helps you an upvote and "Accept as Solution" is appreciated.
0 Karma

ethanthomas
Path Finder

if timestamp is not picking , how exactly the _time is getting the correct time by difference only in seconds ? in the raw data , ia m not seeing any other time parametes . 

0 Karma
Get Updates on the Splunk Community!

Splunk Mobile: Your Brand-New Home Screen

Meet Your New Mobile Hub  Hello Splunk Community!  Staying connected to your data—no matter where you are—is ...

Introducing Value Insights (Beta): Understand the Business Impact your organization ...

Real progress on your strategic priorities starts with knowing the business outcomes your teams are delivering ...

Enterprise Security (ES) Essentials 8.3 is Now GA — Smarter Detections, Faster ...

As of today, Enterprise Security (ES) Essentials 8.3 is now generally available, helping SOC teams simplify ...