Getting Data In

wrong year in _time

boromir
Path Finder

Hi,

I have several data sources that have each their own timestamp(different times, one format) due to Geo differences, however according to source_type time settings, they should all be indexed according to the time of the enterprise.

That works like a charm most of the times, however every now and then, SPLUNk decides to change the year of my events from 2020 to 2019, or some other time change. This does not happen to all indexes,

For example , I read the _audit for fired alerts, which are then dashboareded correctly, however, the events themselves are nowhere to be found, unless I decide to change the search to 2019.

So far I can not relate such situations to anything out of normal. Any ideas?

kind regards!

 

Labels (1)
0 Karma
1 Solution

boromir
Path Finder

Just an update,

We got a different perspective now. We managed to take a fresh look at it , and as usual the problem was easy to solve and infront of our eyes.

Date formats.....it is just that we are used to D/M/Y, while the SPLUNKs defaults are M/D/Y .....

🙂

kind regards!

View solution in original post

0 Karma

richgalloway
SplunkTrust
SplunkTrust

Can you share some example events with the wrong year?  What are the props.conf settings for the sourcetype?

---
If this reply helps you, Karma would be appreciated.
0 Karma

boromir
Path Finder

Hi, thanks for the response.

I spent a bit more time trying to narrow down the actual problem, and have some new findings. The year change actually happened only once, and it could have been because of a SPLUNK restart, or restart of some of the machines with the Forwarders(or any other event) however, i managed to find out that it is not the year change was that is the real problem .

It seems that the search plays some game with us when searching for events. here is an explanation.

An event is logged and existing(known date, know hour) 

alert is triggered - correctly

alert_fire event is logged correctly in _audit

if  search for the actual event in logs (_main index)is performed using "All time" option, the event is present in the results

if the search is performed using any "Relative" option the event is not present - despite the event being within the relative range

if the search is performed using "Date range" or "Date and time range" with "before" sub-option, the event is there and it is fine.

If i use the aforementioned options with "Since or Between" sub-options.....nothing

That is for every type of event , and so far I do not see any connection to Sourcetype or Host.....

 

baffling isn't it....

 

0 Karma

boromir
Path Finder

Just an update,

We got a different perspective now. We managed to take a fresh look at it , and as usual the problem was easy to solve and infront of our eyes.

Date formats.....it is just that we are used to D/M/Y, while the SPLUNKs defaults are M/D/Y .....

🙂

kind regards!

0 Karma
Get Updates on the Splunk Community!

Enhance Security Visibility with Splunk Enterprise Security 7.1 through Threat ...

(view in My Videos)Struggling with alert fatigue, lack of context, and prioritization around security ...

Troubleshooting the OpenTelemetry Collector

  In this tech talk, you’ll learn how to troubleshoot the OpenTelemetry collector - from checking the ...

Adoption of Infrastructure Monitoring at Splunk

  Splunk's Growth Engineering team showcases one of their first Splunk product adoption-Splunk Infrastructure ...