Splunk Search

The events time do not march the time field in events

perlish
Communicator

Why the time of a part of the events are different from what the time field show?
And how to set the config to make time of events right?

Tags (1)
0 Karma

pembleton
Path Finder

There are numerous answers to your question, here are some, but you should go and some more for a better understanding:

  • bad timestamp extraction
  • no timestamp extraction (splunk takes time from file date, or system time)
  • different timezone (set for the sourcetype in props.conf, you have changed time settings on the indexer system, timezone set for the user viewing the events )

martin_mueller
SplunkTrust
SplunkTrust

I'm not exactly certain if I understand your question, but it sounds like you might need this: http://docs.splunk.com/Documentation/Splunk/latest/Data/Configuretimestamprecognition

linu1988
Champion

Splunk doesn't get the event times from the logs.
You have to specify the time format explicitly to get the timing.

In props.conf

TIME_FORMAT= Log_time format e.g. y%:m%:d%
TIME_PREFIX=regex to get the time filed
MAX_TIMESTAMP_LOOKAHEAD= Specify the size of the time fields to look at

These are the most useful field to get it resolved. New index data will show the update but the old data stat as it is.

0 Karma
Get Updates on the Splunk Community!

Webinar Recap | Revolutionizing IT Operations: The Transformative Power of AI and ML ...

The Transformative Power of AI and ML in Enhancing Observability   In the realm of IT operations, the ...

.conf24 | Registration Open!

Hello, hello! I come bearing good news: Registration for .conf24 is now open!   conf is Splunk’s rad annual ...

ICYMI - Check out the latest releases of Splunk Edge Processor

Splunk is pleased to announce the latest enhancements to Splunk Edge Processor.  HEC Receiver authorization ...