Splunk默认会将日志中最先出现的时间作为事件的事件
例如,我这里有一笔防火墙日志
Mar 4 10:53:30 172.23.5.111 Mar 4 10:35:04 PA-3020 1,2019/03/04 10:35:03,001801037311,TRAFFIC,end,1,2019/03/04 10:35:03,172.23.4.49,10.29.4.192,0.0.0.0,0.0.0.0,Tap,,,msrpc-base,vsys1,Tap,Tap,ethernet1/12,ethernet1/12,,2019/03/04 10:35:03,95098,1,54260,135,0,0,0x1c,tcp,allow,2632,1484,1148,24,2019/03/04 10:34:36,12,any,0,2511479410,0x0,172.16.0.0-172.31.255.255,10.0.0.0-10.255.255.255,0,14,10,tcp-fin,0,0,0,0,,PA-3020,from-policy,,,0,,0,,N/A
默认情况下,当Splunk收到这一笔数据,_time为19/03/04 10:53:30.000,实际上“Mar 4 10:35:04”才是设备产生这一笔日志的时间,如果我想拿第二个时间作为事件的时间,要怎么做呢?
方法如下:
在props.conf找到对应的sourcetype,添加