Getting Data In

Event received time vs parsed event time

alexander_lucas
Explorer

Dears,

Are there separate fields for:

Event received time (when event was received by Splunk); and

Parsed (extracted) event time?

My understanding is that for any events that have a recognisable timestamp Splunk will try to extract it at index time and store in the _time internal field (as epoch time).

Then at search time Spunk dynamically creates date_* fields. What I would like to know if there is another field that contains event received time (regardless of the event content, extractions etc) ?

Tags (2)
1 Solution

gkanapathy
Splunk Employee
Splunk Employee

There is a field _indextime on each event that indicates when an event was indexed.

View solution in original post

gkanapathy
Splunk Employee
Splunk Employee

There is a field _indextime on each event that indicates when an event was indexed.

alexander_lucas
Explorer

thank you gk and araitz

0 Karma

araitz
Splunk Employee
Splunk Employee

To make it viewable, add to your search: | eval indextime=_indextime

Get Updates on the Splunk Community!

Building Reliable Asset and Identity Frameworks in Splunk ES

 Accurate asset and identity resolution is the backbone of security operations. Without it, alerts are ...

Cloud Monitoring Console - Unlocking Greater Visibility in SVC Usage Reporting

For Splunk Cloud customers, understanding and optimizing Splunk Virtual Compute (SVC) usage and resource ...

Automatic Discovery Part 3: Practical Use Cases

If you’ve enabled Automatic Discovery in your install of the Splunk Distribution of the OpenTelemetry ...