Hi guys,
I have a log file that occasionally logs an event which contains two dates. For example, like this:
2014-10-02 00:25:28.592991+10~^~log_name~^~WARNING: Message for 01st October 2014 etc etc there is missing data~^~2~^~function_name~^~~^~database_name~^~role_name~^~~^~server~^~
The first part of the log entry is the exact time that the message gets logged, so in this case, it's 2nd October at 12:25am.
The next part starting with "Warning..." is just an error message that i want to report on, and it contains a date (1st October 2014).
The problem i am having is that Splunk is reading "01st October 2014" from the information, and indexing it for that time, and not the correct time on 2nd October.
So basically, being brief, the log entry should be getting indexed for the 2nd October, 2014 at 00:25:28am, but it is instead getting indexed for 1st October, 2014 at 00:25:28am. This is causing issues with my alerts that are running etc
Does anyone know how i can get Splunk to not read second date and to index on the first date occurance only?
If i haven't made something clear please let me know.
Your help is much appreciated.
thanks
... View more