Splunk Search

date_* fields are being duplicated when only one timestamp exists in record

bnolen
Path Finder

Hi All,

I have a situation where the date_* fields are being duplicated.

This is affecting all events that come from my heavy forwarder to my indexer.

Example screencap below:

Screen Shot showing duplication

0 Karma

woodcock
Esteemed Legend

This is surely a bug and certainly fixed by now.

0 Karma

bnolen
Path Finder

if it makes any difference/help:

forwarder version: 4.1.3 build 80534
indexer version: 4.1.4 build 82143

0 Karma

southeringtonp
Motivator

Not sure of the cause, but interesting that the date_zone is showing up with two different values...

0 Karma

bnolen
Path Finder

The search was just:

  • | table time, date*

with the time range restricted to one minute worth of logs.

0 Karma

Lowell
Super Champion

Can you provide the search that you used in the above example. I suspect this will need to be sent to splunk support.

0 Karma
Get Updates on the Splunk Community!

Index This | Why did the turkey cross the road?

November 2025 Edition  Hayyy Splunk Education Enthusiasts and the Eternally Curious!   We’re back with this ...

Enter the Agentic Era with Splunk AI Assistant for SPL 1.4

  🚀 Your data just got a serious AI upgrade — are you ready? Say hello to the Agentic Era with the ...

Feel the Splunk Love: Real Stories from Real Customers

Hello Splunk Community,    What’s the best part of hearing how our customers use Splunk? Easy: the positive ...