Closed oohnana closed 5 years ago
I'll take a look at this. Likely I just need to define the field in the inputs.conf to use the proper field.
This is resolved in published version 1.0.14 @aspina
I had to add TIME_PREFIX. What was happening was that the Splunk Event was not finding the timestamp entry in the MAX_LOOK_AHEAD size. Adding the TIME_PREFIX tells it exactly where to start looking.
Timestamp still was not matching even though there were no more WARN DateParserVerbose - Failed to parse timestamp in first MAX_TIMESTAMP_LOOKAHEAD (40) characters of event. Defaulting to timestamp of previous event
events in the splunkd.log.
Had to do a slight tweak to the timestamp in the props.conf and it seems to be working in my testing now.
TIME_PREFIX = timestamp
TIME_FORMAT = %Y-%m-%dT%H:%M:%SZ
Latest test in my environment showed the timestamp and event time stamp matching now.
When setting search to All time (real-time), we see events streaming in with OLD timestamps. I've narrowed this down to Splunk extracting the Last-Modified header (when present) on sigsci-requests and not the "timestamp" field. Additionally, at least in our implementation, %f is not needed as shown in your TIME_FORMAT, as we are not getting milliseconds returned, at least not in "timestamp:". Thoughts on how to fix ?