Splunk Search

Splunk platform release notes


I was going through the Release note which was updated into Splunk Docs recently.

It is mentioned that

Beginning on January 1, 2020, un-patched Splunk platform instances will be unable to recognize timestamps from events where the date contains a two-digit year. This means data that meets this criteria will be indexed with incorrect timestamps.

My Splunk version of Splunk Enterprise is 7.0.2, I have checked the format of timestamp from some of the sample events which are indexing into my Splunk instances. The timestamp format of the events which are forwarded to Splunk is correct with four-digit of year. But only my Splunk is showing the timestamp of logged events in two-digit of year. Please refer the highlighted part in the screenshot Splunk_events_timestamp

Is the existing timestamp format with the events are right or should I need to modify anything to accommodate with the changes effective on January 1st 2020?

0 Karma


Problem as i got it is from a regex in the file on the splunk installation so splunk will not be able to read timestamps with a 20 instead of 19 in the start.

They do not have 2020 in the regex but only 2010-2019 (simplified)
Meaning that we need to update that file datetime.xml on all hosts that process data with timestamps.

0 Karma
Get Updates on the Splunk Community!

Optimize Cloud Monitoring

  TECH TALKS Optimize Cloud Monitoring Tuesday, August 13, 2024  |  11:00AM–12:00PM PST   Register to ...

What's New in Splunk Cloud Platform 9.2.2403?

Hi Splunky people! We are excited to share the newest updates in Splunk Cloud Platform 9.2.2403! Analysts can ...

Stay Connected: Your Guide to July and August Tech Talks, Office Hours, and Webinars!

Dive into our sizzling summer lineup for July and August Community Office Hours and Tech Talks. Scroll down to ...