I am facing an issue, where there are two timestamps in the events, and I want Splunk to detect the first time stamp, not the second one. How can I get it done? here is a sample event
Mar 20 06:27:29 10.214.14.249 id=EQSONICWALL sn=C0EAE4FC9962 time="2019-03-20 05:27:29" fw=10.214.14.249 pri=6 c=1024 m=537
Hi
You need to make the changes in the props.conf, under which you need to change the time format and you can see the first timestamp With the sample event you have provided you need to makes these changes if you need the first timestamp to be in the event.
TIME_PREFIX = ^
TIME_FORMAT = %b %d %H:%M:%S
MAX_TIMESTAMP_LOOKAHEAD =15