So there you are. You’re an average geek with a nice cluster of Linux systems. All configured to act together in whatever you’re doing with it.
Example 1: Your systems are connected via a fast pipe to the Internet. And since systems on the Internet are cracked on an almost hourly basis, you want your logging on all systems to be correct enabling you to contact the abuse center of the ISP of that script kiddie. For that you want correct timestamps in your logging. You want to know exactly when that cracker started his attacks.