Getting Data In

Where does Splunk keep metadata on when a log was indexed?

kalik
Explorer

The logs I've got only have log generation timestamps in them, and the timestamp in Splunk reflects the log generation date. Does Splunk keep metadata on when a specific log was delivered/acquired from the forwarder/host? If it does, how can I get that metadata?

0 Karma
1 Solution

esix_splunk
Splunk Employee
Splunk Employee

Splunk wont keep the this information, per se, in metadata. Your best way to approach this would be to look at the index time of the event and compare that to the timestamp of the event. Thats about as close as you can get from seeing the different of when the event arrived and was indexed vs what the timestamp of the event is.

This field is stored in field called "_indextime".

... | eval ingesttime=_indextime | table ingesttime

View solution in original post

esix_splunk
Splunk Employee
Splunk Employee

Splunk wont keep the this information, per se, in metadata. Your best way to approach this would be to look at the index time of the event and compare that to the timestamp of the event. Thats about as close as you can get from seeing the different of when the event arrived and was indexed vs what the timestamp of the event is.

This field is stored in field called "_indextime".

... | eval ingesttime=_indextime | table ingesttime

pradeepkumarg
Influencer

You can look at _indextime to know when a particular event was actually indexed

Add this to your search

 | convert ctime(_indextime) as INDEX_TIME

0 Karma
Get Updates on the Splunk Community!

Index This | Why did the turkey cross the road?

November 2025 Edition  Hayyy Splunk Education Enthusiasts and the Eternally Curious!   We’re back with this ...

Enter the Agentic Era with Splunk AI Assistant for SPL 1.4

  🚀 Your data just got a serious AI upgrade — are you ready? Say hello to the Agentic Era with the ...

Feel the Splunk Love: Real Stories from Real Customers

Hello Splunk Community,    What’s the best part of hearing how our customers use Splunk? Easy: the positive ...