<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Splunk Default Fields in Data in Splunk Search</title>
    <link>https://community.splunk.com/t5/Splunk-Search/Splunk-Default-Fields-in-Data/m-p/199237#M57678</link>
    <description>&lt;P&gt;Nothing will happen during indexing, as fields in your raw log data are generally not extracted until at search-time. Also as somesoni2 points out, by default fields with existing values will not be overwritten by field extractions so nothing will happen at search-time either by default. The &lt;CODE&gt;_time&lt;/CODE&gt; -&amp;gt; &lt;CODE&gt;time&lt;/CODE&gt; renaming is due to the &lt;CODE&gt;CLEAN_KEYS&lt;/CODE&gt; property in props.conf which cleans the field names to remove special characters, leading underscores etc.&lt;/P&gt;</description>
    <pubDate>Thu, 09 Jan 2014 21:16:52 GMT</pubDate>
    <dc:creator>Ayn</dc:creator>
    <dc:date>2014-01-09T21:16:52Z</dc:date>
    <item>
      <title>Splunk Default Fields in Data</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Splunk-Default-Fields-in-Data/m-p/199235#M57676</link>
      <description>&lt;P&gt;What happens during indexing if my data were to have key value pairs where the key is the same as one of the default Splunk fields? For instance, say my data looked like this...&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;_time="2014-01-09 12:15:15" host="myhost" source="mysource" sourcetype="mysourcetype" etc...
&lt;/CODE&gt;&lt;/PRE&gt;</description>
      <pubDate>Thu, 09 Jan 2014 20:18:57 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Splunk-Default-Fields-in-Data/m-p/199235#M57676</guid>
      <dc:creator>fredclown</dc:creator>
      <dc:date>2014-01-09T20:18:57Z</dc:date>
    </item>
    <item>
      <title>Re: Splunk Default Fields in Data</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Splunk-Default-Fields-in-Data/m-p/199236#M57677</link>
      <description>&lt;P&gt;With quick test, it seems Splunk will ignore all the fields in the log file with same name as default splunk fields, except _time which will get renamed as "time"&lt;/P&gt;

&lt;P&gt;This is the test log I used.&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;2014-01-09 12:15:15 _time="2014-01-09 12:15:15" host="myhost" source="mysource" sourcetype="mysourcetype" date_hour=1 date_minute=1 date_second=1 date_mday=1 date_wday=wednesday date_month=1 date_year=2014 index=test splunk_server=na
&lt;/CODE&gt;&lt;/PRE&gt;</description>
      <pubDate>Thu, 09 Jan 2014 21:12:48 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Splunk-Default-Fields-in-Data/m-p/199236#M57677</guid>
      <dc:creator>somesoni2</dc:creator>
      <dc:date>2014-01-09T21:12:48Z</dc:date>
    </item>
    <item>
      <title>Re: Splunk Default Fields in Data</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Splunk-Default-Fields-in-Data/m-p/199237#M57678</link>
      <description>&lt;P&gt;Nothing will happen during indexing, as fields in your raw log data are generally not extracted until at search-time. Also as somesoni2 points out, by default fields with existing values will not be overwritten by field extractions so nothing will happen at search-time either by default. The &lt;CODE&gt;_time&lt;/CODE&gt; -&amp;gt; &lt;CODE&gt;time&lt;/CODE&gt; renaming is due to the &lt;CODE&gt;CLEAN_KEYS&lt;/CODE&gt; property in props.conf which cleans the field names to remove special characters, leading underscores etc.&lt;/P&gt;</description>
      <pubDate>Thu, 09 Jan 2014 21:16:52 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Splunk-Default-Fields-in-Data/m-p/199237#M57678</guid>
      <dc:creator>Ayn</dc:creator>
      <dc:date>2014-01-09T21:16:52Z</dc:date>
    </item>
  </channel>
</rss>

