About indexed field extraction
When Splunk software indexes data, it parses the data stream into a series of events. As part of this process, the software adds a number of fields to the event data. These fields include default fields that it adds automatically, as well as any custom fields that you specify.
The process of adding fields to events is known as field extraction. There are two types of field extraction:
- Indexed field extraction, which takes place when the fields are stored in the index and become part of the event data. There are two types of indexed fields:
- Default fields, which Splunk software automatically adds to each event. For more details, see About default fields.
- Custom fields, which you specify. For more details, see Create custom fields at index time.
- Search-time field extraction, which takes place when you search through data. Splunk software creates those fields when compiling search results and does not store them in the index. For information about this type of field extraction, see About fields in the Knowledge Manager Manual.
When working with fields, consider that most machine data either doesn't have structure or has structure that changes constantly. For unstructured data, use search-time field extraction for maximum flexibility. Search-time field extraction is easy to modify after you define it.
Other types of data might exhibit a more fixed structure, or the structure might already be defined within the data or events in the file. You can configure Splunk software to read the structure of these kinds of files, such as comma-separated value (CSV) files, tab-separated value (TSV) files, pipe-separated value files, and JavaScript Object Notation (JSON) data sources, and map fields at index time. To learn how these processes work, see Extract fields from files with structured data.
Tune timestamp recognition for better indexing performance | About default fields (host, source, sourcetype, and more) |
This documentation applies to the following versions of Splunk® Enterprise: 7.0.0, 7.0.1, 7.0.2, 7.0.3, 7.0.4, 7.0.5, 7.0.6, 7.0.7, 7.0.8, 7.0.9, 7.0.10, 7.0.11, 7.0.13, 7.1.0, 7.1.1, 7.1.2, 7.1.3, 7.1.4, 7.1.5, 7.1.6, 7.1.7, 7.1.8, 7.1.9, 7.1.10, 7.2.0, 7.2.1, 7.2.2, 7.2.3, 7.2.4, 7.2.5, 7.2.6, 7.2.7, 7.2.8, 7.2.9, 7.2.10, 7.3.0, 7.3.1, 7.3.2, 7.3.3, 7.3.4, 7.3.5, 7.3.6, 7.3.7, 7.3.8, 7.3.9, 8.0.0, 8.0.1, 8.0.2, 8.0.3, 8.0.4, 8.0.5, 8.0.6, 8.0.7, 8.0.8, 8.0.9, 8.0.10, 8.1.0, 8.1.2, 8.1.3, 8.1.4, 8.1.5, 8.1.6, 8.1.7, 8.1.8, 8.1.9, 8.1.10, 8.1.12, 8.2.0, 8.2.1, 8.2.2, 8.2.3, 8.2.4, 8.2.5, 8.2.6, 8.2.7, 8.2.8, 8.2.9, 8.2.10, 8.2.11, 8.2.12, 9.0.0, 9.0.1, 9.0.2, 9.0.3, 9.0.4, 9.0.5, 9.0.6, 9.0.7, 9.0.8, 9.0.9, 9.0.10, 9.1.0, 9.1.1, 9.1.2, 9.1.3, 9.1.4, 9.1.5, 9.1.6, 9.1.7, 9.2.0, 9.2.1, 9.2.2, 9.2.3, 9.2.4, 9.3.0, 9.3.1, 9.3.2, 8.1.1, 8.1.11, 8.1.13, 8.1.14
Feedback submitted, thanks!