When sending logs to our splunk instance some messages double post time stamps
Apr 30 15:26:42 xx.xx.xx.xxx [!] 2019-04-30 15:26:42: Killing the old Artillery process...
Apr 30 15:26:44 xx.xx.xx.xxx [!] Insecure configuration detected on filesystem: [!] Issue identified: Password authentication enabled. An attacker may be able to brute force weak passwords.
Apr 30 15:28:58 xx.xx.xx.xxx [!] Insecure configuration detected on filesystem: [!] Issue identified: Password authentication enabled. An attacker may be able to brute force weak passwords.
Apr 30 15:41:15 xx.xx.xx.xxx [!] 2019-04-30 15:41:15: Killing the old Artillery process...
Apr 30 15:41:15 xx.xx.xx.xxx [*] 2019-04-30 15:41:15: Restarting the Artillery Server process...
Apr 30 15:41:18 xx.xx.xx.xxx [!] Insecure configuration detected on filesystem: [!] Issue identified: Password authentication enabled. An attacker may be able to brute force weak passwords.
When sending logs to our splunk instance some messages double post time stamps
Apr 30 15:26:42 xx.xx.xx.xxx [!] 2019-04-30 15:26:42: Killing the old Artillery process... Apr 30 15:26:44 xx.xx.xx.xxx [!] Insecure configuration detected on filesystem: [!] Issue identified: Password authentication enabled. An attacker may be able to brute force weak passwords. Apr 30 15:28:58 xx.xx.xx.xxx [!] Insecure configuration detected on filesystem: [!] Issue identified: Password authentication enabled. An attacker may be able to brute force weak passwords. Apr 30 15:41:15 xx.xx.xx.xxx [!] 2019-04-30 15:41:15: Killing the old Artillery process... Apr 30 15:41:15 xx.xx.xx.xxx [*] 2019-04-30 15:41:15: Restarting the Artillery Server process... Apr 30 15:41:18 xx.xx.xx.xxx [!] Insecure configuration detected on filesystem: [!] Issue identified: Password authentication enabled. An attacker may be able to brute force weak passwords.