I have a flat file that is in JSON format where events have no date/time as follows: {"device": "info.gw.xyz.com", "ip": "x.x.x.x", "age": "0", "mac": "Incomplete", "interface": " "}, {"device...
See more...
I have a flat file that is in JSON format where events have no date/time as follows: {"device": "info.gw.xyz.com", "ip": "x.x.x.x", "age": "0", "mac": "Incomplete", "interface": " "}, {"device": "info.gw.xyz.com", "ip": "x.x.x.x", "age": "-", "mac": "0000.0000.0000", "interface": "Vlan673"} My props.conf file is as follows: [my_arp]
INDEXED_EXTRACTIONS = JSON
TZ=UTC Problem is when I search events, they are four hours in the future. The files are on a sever that has the UF and that has the correct time set so looking through the Splunk docs (https://docs.splunk.com/Documentation/Splunk/9.0.1/Data/HowSplunkextractstimestamps) I see this: If no events in the source have a date, Splunk software tries to find a date in the source name or file name. The events must have a time, even if they don't have a date. The files do have a date and time How do I fix this? Thx