All Apps and Add-ons

Which field does SPlunk App for Stream consider as _time if there are multiple time fileds in the stream?


We are ingesting the stream data from an extrnal device into the search head.
The Fields are getting extracted automatically.
There are multiple timestamp fields in the stream data.
we are confused on which timestamp does the Splunk consider as _time?
what is the criteria for getting _time from log data or stream data if there are multiple time entries?

0 Karma

Splunk Employee
Splunk Employee

Sorry, just noticed this question.

There are two main timestamp-like fields in Stream: timestamp and endtime. timestamp records the flow/event "start" time (timestamp of the first packet in a flow, or a first packet pertaining to an application protocol event). endtime stores the moment in time when an event was finished/generated. endtime is also used as a source of _time field in Splunk

0 Karma
Get Updates on the Splunk Community!

Admin Your Splunk Cloud, Your Way

Join us to maximize different techniques to best tune Splunk Cloud. In this Tech Enablement, you will get ...

Cloud Platform | Discontinuing support for TLS version 1.0 and 1.1

Overview Transport Layer Security (TLS) is a security communications protocol that lets two computers, ...

New Customer Testimonials

Enterprises of all sizes and across different industries are accelerating cloud adoption by migrating ...