You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
{{ message }}
This repository has been archived by the owner on Dec 14, 2024. It is now read-only.
Description
When using the Cortex API input, the event time is incorrectly extracted as the index time
Expected behavior
There are available fields in the JSON data set that are more suitable for the
_time
field.Specifically the
creation_time
field would be best given the sourcetype is set as "incident" and represents this event more closely.Current behavior
The
indextime
is used for the event which is misleading.Possible solution
Specify timestamp recognition using
props.conf
."Hacky" example below that I haven't tested:
See this page for more detail.
Steps to reproduce
index
).Screenshots
N/A. I would have to redact too much data.
(use the SPL above on an example data set).
Context
Accurate time representation is critical to correlated activity.
Decreased API frequency (i.e. longer in-between) will exacerbate time skew.
Your Environment
Splunk Cloud
9.0.2205.1
Palo Alto Networks Add on
7.1.0
The text was updated successfully, but these errors were encountered: