<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic index time field extraction in Getting Data In</title>
    <link>https://community.splunk.com/t5/Getting-Data-In/index-time-field-extraction/m-p/47213#M8968</link>
    <description>&lt;P&gt;When I do index time field extraction will Splunk create a new separate index for the values in the extracted field ( For example a B-tree index) or will Splunk add key=value pairs as keywords to the existing full-text indexes found in the *.tsidx files?&lt;/P&gt;</description>
    <pubDate>Thu, 30 Aug 2012 07:55:21 GMT</pubDate>
    <dc:creator>grodaas</dc:creator>
    <dc:date>2012-08-30T07:55:21Z</dc:date>
    <item>
      <title>index time field extraction</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/index-time-field-extraction/m-p/47213#M8968</link>
      <description>&lt;P&gt;When I do index time field extraction will Splunk create a new separate index for the values in the extracted field ( For example a B-tree index) or will Splunk add key=value pairs as keywords to the existing full-text indexes found in the *.tsidx files?&lt;/P&gt;</description>
      <pubDate>Thu, 30 Aug 2012 07:55:21 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/index-time-field-extraction/m-p/47213#M8968</guid>
      <dc:creator>grodaas</dc:creator>
      <dc:date>2012-08-30T07:55:21Z</dc:date>
    </item>
    <item>
      <title>Re: index time field extraction</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/index-time-field-extraction/m-p/47214#M8969</link>
      <description>&lt;P&gt;Splunk adds key-value pairs. Unless you have a very specific (and &lt;EM&gt;unusual&lt;/EM&gt;) situation, index time field extraction will &lt;STRONG&gt;&lt;EM&gt;not&lt;/EM&gt;&lt;/STRONG&gt; improve performance. However, it is more complex, more error-prone and inflexible. This is why Splunk strongly encourages you to use search time field extractions. Index time field extraction &lt;STRONG&gt;is not faster&lt;/STRONG&gt; - with very rare exceptions. Do not use it unless you must.&lt;/P&gt;

&lt;P&gt;Splunk field extractions and Splunk indexing are not the same as relational database indexes. They are not remotely equivalent from a functional configuration perspective.&lt;/P&gt;

&lt;P&gt;Did I say "don't use index time field extraction" often enough? I can say it again...&lt;/P&gt;

&lt;P&gt;Also see this answer: &lt;A href="http://splunk-base.splunk.com/answers/5817/search-time-versus-index-time-field-extractions"&gt;Search-time versus index-time field extractions&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 03 Sep 2012 07:58:26 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/index-time-field-extraction/m-p/47214#M8969</guid>
      <dc:creator>lguinn2</dc:creator>
      <dc:date>2012-09-03T07:58:26Z</dc:date>
    </item>
  </channel>
</rss>

