Getting Data In

Showing indexed time?

msarro
Builder

Hey everyone,
Is there a way to show the indexed time of an event (as opposed to the timestamp)? I am trying to see if my forwarders are capable of keeping up with the volume of data that I am sending - I seem to be missing a lot of events and I want to make sure I'm not losing them when my pruning process runs.

Tags (1)

Lowell
Super Champion

Look at the hidden _indextime field. I've found it helpful to look at the delay of each event and chart the results like so:

your search ... | eval delay=_indextime-_time | bucket bins=30 delay | chart count by delay

mendesjo
Path Finder

Doesn't work for me 😞 I add this to a query and I do not see _indextime values,

0 Karma

mendesjo
Path Finder

Here is the answer
YOUR QUERY | eval lag_sec=_indextime-_time | table lag_sec

0 Karma

Stephen_Sorkin
Splunk Employee
Splunk Employee

This data is stored in the _indextime field.

You can access it via:

... | eval indexed_time=strftime(_indextime, "%+")

Or:

... | eval lag = _indextime - _time
Got questions? Get answers!

Join the Splunk Community Slack to learn, troubleshoot, and make connections with fellow Splunk practitioners in real time!

Meet up IRL or virtually!

Join Splunk User Groups to connect and learn in-person by region or remotely by topic or industry.

Get Updates on the Splunk Community!

Build the Future of Agentic AI: Join the Splunk Agentic Ops Hackathon

AI is changing how teams investigate incidents, detect threats, automate workflows, and build intelligent ...

[Puzzles] Solve, Learn, Repeat: Character substitutions with Regular Expressions

This challenge was first posted on Slack #puzzles channelFor BORE at .conf23, we had a puzzle question which ...

Splunk Community Badges!

  Hey everyone! Ready to earn some serious bragging rights in the community? Along with our existing badges ...