Getting Data In

Event received time vs parsed event time

alexander_lucas
Explorer

Dears,

Are there separate fields for:

Event received time (when event was received by Splunk); and

Parsed (extracted) event time?

My understanding is that for any events that have a recognisable timestamp Splunk will try to extract it at index time and store in the _time internal field (as epoch time).

Then at search time Spunk dynamically creates date_* fields. What I would like to know if there is another field that contains event received time (regardless of the event content, extractions etc) ?

Tags (2)
1 Solution

gkanapathy
Splunk Employee
Splunk Employee

There is a field _indextime on each event that indicates when an event was indexed.

View solution in original post

gkanapathy
Splunk Employee
Splunk Employee

There is a field _indextime on each event that indicates when an event was indexed.

alexander_lucas
Explorer

thank you gk and araitz

0 Karma

araitz
Splunk Employee
Splunk Employee

To make it viewable, add to your search: | eval indextime=_indextime

Get Updates on the Splunk Community!

Tech Talk Recap | Mastering Threat Hunting

Mastering Threat HuntingDive into the world of threat hunting, exploring the key differences between ...

Observability for AI Applications: Troubleshooting Latency

If you’re working with proprietary company data, you’re probably going to have a locally hosted LLM or many ...

Splunk AI Assistant for SPL vs. ChatGPT: Which One is Better?

In the age of AI, every tool promises to make our lives easier. From summarizing content to writing code, ...