Try this: [azure:eventhub]
DATETIME_CONFIG = CURRENT props.conf snippet: DATETIME_CONFIG = [<filename relative to $SPLUNK_HOME> | CURRENT | NONE]
* Specifies which file configures the timestamp extractor, which identifies
timestamps from the event text.
* This setting may also be set to "NONE" to prevent the timestamp
extractor from running or "CURRENT" to assign the current system time to
each event.
* "CURRENT" sets the time of the event to the time that the event was
merged from lines, or worded differently, the time it passed through the
aggregator processor.
* "NONE" leaves the event time set to whatever time was selected by
the input layer
* For data sent by Splunk forwarders over the Splunk-to-Splunk protocol,
the input layer is the time that was selected on the forwarder by
its input behavior (as below).
* For file-based inputs (monitor, batch) the time chosen is the
modification timestamp on the file being read.
* For other inputs, the time chosen is the current system time when
the event is read from the pipe/socket/etc.
* Both "CURRENT" and "NONE" explicitly disable the per-text timestamp
identification, so the default event boundary detection
(BREAK_ONLY_BEFORE_DATE = true) is likely to not work as desired. When
using these settings, use 'SHOULD_LINEMERGE' and/or the 'BREAK_ONLY_*' ,
'MUST_BREAK_*' settings to control event merging.
* For more information on 'DATETIME_CONFIG' and datetime.xml, see "Configure
advanced timestamp recognition with datetime.xml" in the Splunk Documentation.
* Default: /etc/datetime.xml (for example, $SPLUNK_HOME/etc/datetime.xml). https://docs.splunk.com/Documentation/Splunk/latest/Admin/propsconf
... View more