Splunk Search

_time and the timestamp in the row data are having slight variation

ethanthomas
Explorer

I could see there is a slight difference ( in seconds - from 1 to 10) between the _time and the timestamp field in the row data. Is this expected or this should be exacty matching ? Please note that the difference is only interms of seconds . 

Is there someway to fix this issue ? What could be the reason the _time is not showing exact time as in the timestamp ? 

 

Labels (4)
Tags (2)
0 Karma

scelikok
SplunkTrust
SplunkTrust

Hi @ethanthomas,

If Splunk uses your timestamp field, it will be exactly same regardless of any latency/delay on ingestion. But it seems Splunk cannot recognize timestamp in the first 128 characters and putting its current time. 

Can you please post a sample full event?

If this reply helps you an upvote and "Accept as Solution" is appreciated.
0 Karma

scelikok
SplunkTrust
SplunkTrust

Hi @ethanthomas,

It seems Splunk is not using your timestamp field as _time during ingestion. You should check your props.conf on indexers or heavy forwarder. Be sure following are set and correct;

TIME_PREFIX

TIME_FORMAT

If this reply helps you an upvote and "Accept as Solution" is appreciated.
0 Karma

ethanthomas
Explorer

if timestamp is not picking , how exactly the _time is getting the correct time by difference only in seconds ? in the raw data , ia m not seeing any other time parametes . 

0 Karma
Get Updates on the Splunk Community!

.conf24 | Day 0

Hello Splunk Community! My name is Chris, and I'm based in Canberra, Australia's capital, and I travelled for ...

Enhance Security Visibility with Splunk Enterprise Security 7.1 through Threat ...

(view in My Videos)Struggling with alert fatigue, lack of context, and prioritization around security ...

Troubleshooting the OpenTelemetry Collector

  In this tech talk, you’ll learn how to troubleshoot the OpenTelemetry collector - from checking the ...