Getting Data In

Splunk Indexing Question

andrew_burnett
Path Finder

My index shows the latest event section "in an hour", I have never seen that before. What exactly does that mean?Screenshot (51).png

Labels (1)
0 Karma
1 Solution

PickleRick
SplunkTrust
SplunkTrust

I can't see your screenshot clearly (the left half of it is completely unnecessary ;)) but in general "in <time spec>" means a timestamp in the future. So you probably have some misconfiguration and some events are either sent with a timestamp from the future or are getting parsed as such. Typical scenario - timezone mismatch between the sender and sourcetype config.

View solution in original post

0 Karma

PickleRick
SplunkTrust
SplunkTrust

I can't see your screenshot clearly (the left half of it is completely unnecessary ;)) but in general "in <time spec>" means a timestamp in the future. So you probably have some misconfiguration and some events are either sent with a timestamp from the future or are getting parsed as such. Typical scenario - timezone mismatch between the sender and sourcetype config.

0 Karma
Career Survey
First 500 qualified respondents will receive a $20 gift card! Tell us about your professional Splunk journey.
Get Updates on the Splunk Community!

.conf25 Global Broadcast: Don’t Miss a Moment

Hello Splunkers, .conf25 is only a click away.  Not able to make it to .conf25 in person? No worries, you can ...

Observe and Secure All Apps with Splunk

 Join Us for Our Next Tech Talk: Observe and Secure All Apps with SplunkAs organizations continue to innovate ...

What's New in Splunk Observability - August 2025

What's New We are excited to announce the latest enhancements to Splunk Observability Cloud as well as what is ...