Splunk Search

date_* fields are being duplicated when only one timestamp exists in record

bnolen
Path Finder

Hi All,

I have a situation where the date_* fields are being duplicated.

This is affecting all events that come from my heavy forwarder to my indexer.

Example screencap below:

Screen Shot showing duplication

0 Karma

woodcock
Esteemed Legend

This is surely a bug and certainly fixed by now.

0 Karma

bnolen
Path Finder

if it makes any difference/help:

forwarder version: 4.1.3 build 80534
indexer version: 4.1.4 build 82143

0 Karma

southeringtonp
Motivator

Not sure of the cause, but interesting that the date_zone is showing up with two different values...

0 Karma

bnolen
Path Finder

The search was just:

  • | table time, date*

with the time range restricted to one minute worth of logs.

0 Karma

Lowell
Super Champion

Can you provide the search that you used in the above example. I suspect this will need to be sent to splunk support.

0 Karma
Get Updates on the Splunk Community!

Modern way of developing distributed application using OTel

Recently, I had the opportunity to work on a complex microservice using Spring boot and Quarkus to develop a ...

Enterprise Security Content Update (ESCU) | New Releases

Last month, the Splunk Threat Research Team had 3 releases of new security content via the Enterprise Security ...

Archived Metrics Now Available for APAC and EMEA realms

We’re excited to announce the launch of Archived Metrics in Splunk Infrastructure Monitoring for our customers ...