A log file is being ingested into Splunk, and a few events have no date stamp. How would Splunk first try to determine the missing date of the events?
When events lack a timestamp, Splunk defaults to using the file modification time, which is accessible metadata for parsing time information if no timestamp is present in the log entry. [Reference: Splunk Docs on timestamp recognition]
Audry
1 months agoPearline
15 days agoAriel
16 days agoRuthann
2 months agoQueenie
2 months agoKeena
2 months agoCarey
2 months agoLetha
2 months agoAlana
2 months agoFredric
2 months agoBillye
3 months agoLeeann
1 months agoSerina
1 months agoTruman
1 months ago