Timestamp configuration

Dynatrace version 1.252+ OneAgent version 1.247+

Dynatrace allows you to define rules that control log data timestamps.

Timestamp detection

By default, log monitoring automatically detects only the most common and unambiguous subset of date formats supported. For details, see Supported timestamp formats. Each time a timestamp pattern is detected, the line will be treated as the beginning of the log entry. All following lines without a detected timestamp will be treated as a continuation and reported as a single multi-line log record.

No timestamp detected

When Log Monitoring is unable to determine the time format, it treats each log line as a separate log entry with an automatically assigned timestamp (observation timestamp) using a one-minute time resolution, except for lines starting with whitespaces (space, tab), which are treated as a continuation of an entry.

Timestamp search limit

Regardless of format, the timestamp typically occurs within the first 64 characters of a log entry. However, the timestamp can occur elsewhere, in which case you can raise this limit on the OneAgent configuration page: Log Monitoring > Timestamp/Splitting patterns.

Timestamp rules

Regardless of where it occurs in a log entry, a timestamp may be written in multiple formats. Dynatrace supports some timestamp formats by default, but sometimes multiple formats may fit the incoming log data and match the timestamp to an incorrect timestamp pattern.

Because of this, Log Monitoring also enables you to define a specific date format using timestamp rules that specify what should be considered a timestamp in a log record. These rules contain a timestamp pattern, time zone, and matchers.

  • Pattern—Defines what should be considered a timestamp in your logline.
  • Timestamp search limit—Specifies the count of characters in each log line, measured from the beginning of the line, where the timestamp is searched.
  • Entry boundary—Optional field. Specifies the entry boundary. You need to provide a fragment of the text from the first line of the entry. The pattern is treated literally, which means that there is no support for the asterisk (*) as a wildcard.
  • Time zone—Defines the timestamp time zone. Optional if your timestamp pattern includes the timezone indicator (%z).
  • Matcher—Narrows down the range for the rule and applies the timestamp pattern only to matched log entries. Because you can't use the log.content attribute in the timestamp pattern matchers, the highest granularity is a log source. Granularity is at this level because the timestamp pattern is used to split the contents of a log source into separate log records, so it is used before the log.content attribute's value (or any other attributes set on an individual log record's level) is determined.
    • If you create multiple rules matching the same log data, all defined time formats are searched for.
    • If you have at least one rule matching a given log, predefined formats are not applied to it.

Timestamp configuration examples

Consult the timestamp formats below as configuration examples:

  • Timestamp without the default separator: %Y-%m-%d-%H.%M.%S Example: 2024-09-05-12.30.01

  • Using only timestamps from the beggining of the log entry (%^): %^%F %T Example: 2024-09-05 12:30:01

  • Searching for a timestamp with the field name (JSON): "validTimestamp":"%Y-%m-%dT%H:%M:%S" Example: "validTimestamp": "2024-09-05T12:30:01"

  • Timestamp with timezone offset: %m-%d-%Y %H:%M:%S %z Example: 09-05-2024 12:30:01 +01:00

  • Timestamp with timezone name or abbreviation: %m-%d-%Y %H:%M:%S %Z Example: 09-05-2024 12:30:01 UTC

  • Timestamp excluding the year (the current year is used to evaluate the timestamp): %b %t%d-%H:%M:%S Here, %t maches zero or one white space characters. Example: Apr 4-12:30:01 or Apr 14-12:30:01

  • Any timestamp with the myTime.* prefix: myTime%*: %Y-%m-%dT%H:%M:%S Example: myTimeOfCreation: 2024-09-05T12:30:01 You can overwrite the default timezone by defining the timezone without the timestamp pattern.

  • Two digits year format: %m/%d/%y %H:%M:%S %Z Example: 09/05/24 12:30:01 America/Chicago

Supported scopes

Three hierarchy scopes are supported: host, host group, and environment.

The hierarchy scopes are merged into one list in the following order:

  1. Host rules
  2. Host group rules
  3. Environment rules

Diagram showing the rule priority for timestamp configuration rules.

The OneAgent receives the merged list (merged lists from its respective hosts, host groups, and environments) with no indication of which scopes are defined.

Host scope

The host scope can be accessed through the Host settings for a specific host.

  1. Go to Hosts or Hosts Classic (latest Dynatrace).
  2. Find and select your host to display the host overview page.
  3. In the upper-right corner of the host overview page, select More () > Settings.
  1. In the host settings, select Log Monitoring > Timestamp/Splitting patterns.
  2. Configure data masking by adding rules with a set of matchers that specify what should be considered a timestamp in the log record.

Host group scope

The host group scope can be accessed via the Host page.

  1. Go to Hosts or Hosts Classic (latest Dynatrace) and select the host that interests you.
  2. On the host overview page, select Properties and tags.
  3. On the Properties and tags panel, find the Host group property to see the name of the host group to which the selected host belongs.

    The Host group property is not displayed when the selected host doesn't belong to any host group.

  4. Select the host group name to list all hosts in that host group. This displays the OneAgent deployment page filtered by the selected host group. Each listed host has a Host group: <group name> link, where <group name> is the name of the host group that you want to configure.
  5. Select the host group name in any row.
  1. In the host group settings, select Log Monitoring > Timestamp/Splitting patterns.
  2. Configure data masking by adding rules with a set of matchers that specify what should be considered a timestamp in the log record.

Environment scope

The environment scope is available in the settings menu.

  1. Go to Settings and select Log Monitoring > Timestamp/Splitting patterns.
  2. Configure data masking by adding rules with a set of matchers that identify your sensitive data.

Create rule

To add a rule (on the host, host group, or environment level) that interprets the incoming log data timestamps

  1. Select Add rule to start configuring your rule.

  2. Rule name
    The name to display for your configuration.

  3. Pattern
    Enter the pattern to be read as a date from the logs. For details on timestamp formats, see Supported timestamp formats and the following list of format specifiers.

    Pattern

    Description

    %*

    Wildcard matcher.

    %!

    Matches the word boundary. It is any character that is not [0-9A-Za-z_] next to the characters from this group.

    %%

    Matches % character.

    %^

    Matches the beginning of the line.

    %A

    Equivalent to %a.

    %a

    The locale's full or abbreviated case-insensitive weekday name.

    %B

    Equivalent to %b.

    %b

    The locale's full or abbreviated case-insensitive month name.

    %C

    The century as a decimal number. The modified command %NC, where N is a positive decimal integer, specifies the maximum number of characters to read. If not specified, the default is 2. Leading zeroes are permitted but not required.

    %D

    Equivalent to %m/%d/%y.

    %d

    The day of the month as a decimal number. The modified command %Nd, where N is a positive decimal integer, specifies the maximum number of characters to read. If not specified, the default is 2. Leading zeroes are permitted but not required.

    %e

    Equivalent to %d and can be modified like %d.

    %F

    Equivalent to %Y-%m-%d. If modified with width, the width is applied only to %Y.

    %G

    The ISO week-based year as a decimal number. The modified command %NG, where N is a positive decimal integer, specifies the maximum number of characters to read. If not specified, the default is 4. Leading zeroes are permitted but not required.

    %g

    The last two decimal digits of the ISO week-based year. The modified command %Ng, where N is a positive decimal integer, specifies the maximum number of characters to read. If not specified, the default is 2. Leading zeroes are permitted but not required.

    %h

    Equivalent to %b.

    %H

    The hour (24-hour clock) as a decimal number. The modified command %NH, where N is a positive decimal integer, specifies the maximum number of characters to read. If not specified, the default is 2. Leading zeroes are permitted but not required.

    %I

    The hour (12-hour clock) as a decimal number. The modified command %NI, where N is a positive decimal integer, specifies the maximum number of characters to read. If not specified, the default is 2. Leading zeroes are permitted but not required.

    %j

    The day of the year as a decimal number. January 1st is 1. The modified command %Nj, where N is a positive decimal integer, specifies the maximum number of characters to read. If not specified, the default is 3. Leading zeroes are permitted but not required.

    %M

    The minutes as a decimal number. The modified command %NM, where N is a positive decimal integer, specifies the maximum number of characters to read. If not specified, the default is 2. Leading zeroes are permitted but not required.

    %m

    The month as a decimal number. Jan is 1. The modified command %Nm, where N is a positive decimal integer, specifies the maximum number of characters to read. If not specified, the default is 2. Leading zeroes are permitted but not required.

    %n

    Matches one ' ' or '\t' white space character.

    %o

    The 13-digit Unix timestamp in milliseconds.

    %p

    The locale's equivalent of the AM/PM designations associated with a 12-hour clock. The command %I must precede %p in the format string.

    %R

    Equivalent to %H:%M.

    %S

    The seconds as a decimal number. The modified command %NS, where N is a positive decimal integer, specifies the maximum number of characters to read. If not specified, the default is 2 if the input time has a precision convertible to seconds. Otherwise, the default width is determined by the decimal precision of the input, and the field is interpreted as a long double in a fixed format. The decimal point character should be one of the following: , , ., or :. Leading zeroes are permitted but not required.

    %s

    The 10-digit Unix timestamp in seconds.

    %T

    Equivalent to %H:%M:%S.

    %t

    Matches zero or more white space characters.

    %u

    The ISO weekday as a decimal number (1-7), where Monday is 1. The modified command %Nu, where N is a positive decimal integer, specifies the maximum number of characters to read. If not specified, the default is 1. Leading zeroes are permitted but not required.

    %U

    The week number of the year as a decimal number. The first Sunday of the year is the first day of week 01. Days of the same year prior to that are in week 00. The modified command %NU, where N is a positive decimal integer, specifies the maximum number of characters to read. If not specified, the default is 2. Leading zeroes are permitted but not required.

    %V

    The ISO week-based week number as a decimal number. The modified command %NV, where N is a positive decimal integer, specifies the maximum number of characters to read. If not specified, the default is 2. Leading zeroes are permitted but not required.

    %W

    The week number of the year as a decimal number. The first Monday of the year is the first day of week 01. Days of the same year prior to that are in week 00. The modified command %NW, where N is a positive decimal integer, specifies the maximum number of characters to read. If not specified, the default is 2. Leading zeroes are permitted but not required.

    %w

    The weekday as a decimal number (0-6), where Sunday is 0. The modified command %Nw, where N is a positive decimal integer, specifies the maximum number of characters to read. If not specified, the default is 1. Leading zeroes are permitted but not required.

    %y

    The last two decimal digits of the year. If the century is not otherwise specified (for example, with %C), values in the range [69 - 99] are presumed to refer to the years [1969 - 1999], and values in the range [00 - 68] are presumed to refer to the years [2000 - 2068]. The modified command %Ny, where N is a positive decimal integer, specifies the maximum number of characters to read. If not specified, the default is 2. Leading zeroes are permitted but not required.

    %Y

    The year as a decimal number. The modified command %NY, where N is a positive decimal integer, specifies the maximum number of characters to read. If not specified, the default is 4. Leading zeroes are permitted but not required.

    %z

    The offset from UTC in the format [+|-]h[h][mm|:mm]. For example, -0430 refers to 4 hours and 30 minutes behind UTC, +4:30 refers to 4 hours and 30 minutes ahead of UTC, and 04 refers to 4 hours ahead of UTC.

    %Z

    The time zone abbreviation or name. A single word is parsed. This word can only contain characters that are alphanumeric or one of _, /, -, +.

    You need to specify at least the month, day, hours, minutes, and seconds, although you can use alternative formats for them. You can include the time zone indicator (%z) or specify the time zone separately in the rule definition.

  4. Timestamp search limit

    Use this field to define the number of characters in every log line where timestamp is searched. If you want to ignore timestamps and split logs using the default rules, set this value to 0. Use this field to overwrite the global timestamp search limit (default 64 bytes).

  5. Time zone
    Select the time zone to apply to this pattern.
    This setting is not enabled if you have already specified the timezone in the timestamp pattern (%z).

    You can select Local time zone to use the time zone of the host on which the OneAgent is running.

  6. Select Add matcher to create a specific match for this rule and narrow down the scope for that rule.

    You can include multiple matchers in one rule. For example, the timestamp configuration rule can be applied to logs from a specific container, namespace, or log source. Multiple matchers with the same attribute use AND logic between matchers, while matchers with multiple values assigned to them use OR logic.

    Attribute

    Description

    Search dropdown logic

    Process group

    Matching is based on the process group ID.

    Attributes visible in the last 3 days are listed.

    Log source

    Matching is based on a log path; wildcards are supported in form of an asterisk. Autocompletion for Log source is only partial. You can either choose one of the predefined values or enter your log source.

    Can be entered manually. No time limit.

    Log source origin1

    Matching is based on the detector was used by the log agent to discover the log file.

    Can be entered manually. No time limit.

    Host tag23

    Matching is based on the host tag. The attribute only supports the tags set with the OneAgent command line tool or with the Remote configuration in a key=value pair format. They can be distinguished by the [Environment] prefix on the UI, but you should use the value without the prefix. Multiple tags can be specified in a single matcher, but each tag needs to have the same key, such as logscope=frontend, logscope=backend.

    Can be entered manually. No time limit.

    K8s container name

    Matching is based on the name of the Kubernetes container.

    Attributes visible in the last 90 days are listed.

    K8s namespace name

    Matching is based on the name of the Kubernetes namespace.

    Attributes visible in the last 90 days are listed.

    K8s deployment name

    Matching is based on the name of the Kubernetes deployment.

    Attributes visible in the last 90 days are listed.

    Container name

    Matching is based on the name of the container.

    Attributes visible in the last 90 days are listed.

    DT entity container group ID

    Matching is based on any of the selected container groups.

    Can be entered manually. No time limit.

    Process technology

    Matching is based on the technology name.

    Can be entered manually. No time limit.

    1

    The minimum required OneAgent version is 1.295.

    2

    Manually or automatically applied tags are not visible to OneAgent.

    3

    The minimum required OneAgent version is 1.289.

  7. Select the matching attribute.

  8. Select Value and, from the Value list, select the detected log data items.

    You can add multiple values to the selected attribute. You can have one matcher that indicates the Log source and matches values /var/log/syslog and Windows Application Log. Use asterisks (*) as wildcards to get a partial match.

  9. Select Save changes.

Rules are executed in the order in which they appear on the Timestamp/Splitting patterns page.

Rule reorder propagation delay

When you change the rule order (to change the order in which they are executed), allow for two or three minutes of propagation time between when you save the change and when the change takes effect.

The Active toggle

Starting with OneAgent version 1.249, you can activate/inactivate your rules by turning on/off the Active toggle. To manage your rules effectively, we recommend that you upgrade your OneAgent to version 1.249. If you have any rules set on the host with OneAgent version earlier than 249, you will not be able to inactivate them, in which case you need to remove such rules by selecting Delete on the rule level or via the REST API.

Rules are executed in the order in which they appear on the Timestamp/Splitting patterns page.

REST API

You can use the Settings API to manage your timestamp configuration:

  • View schema
  • List stored configuration objects
  • View single configuration object
  • Create new, edit, or remove existing configuration object

To check the current schema version for timestamp configuration, list all available schemas and look for the builtin:logmonitoring.timestamp-configuration schema identifier.

Timestamp configuration objects are available for configuration on the following scopes:

  • environment—configuration object affects all hosts in a given environment.
  • host_group—configuration object affects all hosts assigned to a given host group.
  • host—configuration object affects only the given host.

To create a timestamp configuration using the API

  1. Create an access token with the Write settings (settings.write) and Read settings (settings.read) permissions.

  2. Use the GET a schema endpoint to learn the JSON format required to post your configuration. The timestamp configuration schema identifier (schemaId) is builtin:logmonitoring.timestamp-configuration. Here is an example JSON payload with the timestamp configuration:

    [
    {
    "insertAfter":"uAAZ0ZW5hbnQABnRlbmFudAAkMGUzYmY2ZmYtMDc2ZC0zNzFmLhXaq0",
    "schemaId": "builtin:logmonitoring.timestamp-configuration",
    "schemaVersion": "0.1.0",
    "scope": "tenant",
    "value": {
    "config-item-title": "Added from REST API",
    "date-time-pattern": "%Y-%m-%d %H:%M:%S",
    "timezone": "CET",
    "matchers": [
    {
    "attribute": "dt.entity.process_group",
    "operator": "MATCHES",
    "values": [
    "PROCESS_GROUP-05F00CBACF39EBD1"
    ]
    },
    {
    "attribute": "log.source",
    "operator": "MATCHES",
    "values": [
    "Windows System Log",
    "Windows Security Log"
    ]
    }
    ]
    }
    }
    ]
  3. Use the POST an object endpoint to send your configuration.