Getting Data In

Event received time vs parsed event time

alexander_lucas
Explorer

Dears,

Are there separate fields for:

Event received time (when event was received by Splunk); and

Parsed (extracted) event time?

My understanding is that for any events that have a recognisable timestamp Splunk will try to extract it at index time and store in the _time internal field (as epoch time).

Then at search time Spunk dynamically creates date_* fields. What I would like to know if there is another field that contains event received time (regardless of the event content, extractions etc) ?

Tags (2)
1 Solution

gkanapathy
Splunk Employee
Splunk Employee

There is a field _indextime on each event that indicates when an event was indexed.

View solution in original post

gkanapathy
Splunk Employee
Splunk Employee

There is a field _indextime on each event that indicates when an event was indexed.

alexander_lucas
Explorer

thank you gk and araitz

0 Karma

araitz
Splunk Employee
Splunk Employee

To make it viewable, add to your search: | eval indextime=_indextime

Get Updates on the Splunk Community!

Automatic Discovery Part 1: What is Automatic Discovery in Splunk Observability Cloud ...

If you’ve ever deployed a new database cluster, spun up a caching layer, or added a load balancer, you know it ...

Real-Time Fraud Detection: How Splunk Dashboards Protect Financial Institutions

Financial fraud isn't slowing down. If anything, it's getting more sophisticated. Account takeovers, credit ...

Splunk + ThousandEyes: Correlate frontend, app, and network data to troubleshoot ...

 Are you tired of troubleshooting delays caused by siloed frontend, application, and network data? We've got a ...