Splunk Cloud

Getting Data In

Download manual as PDF

Download topic as PDF

Configure event timestamps

This topic discusses how Splunk software handles timestamps.

Examine this sample event: - - [01/Jul/2017:12:05:27 -0700] "GET /trade/app?action=logout HTTP/1.1" 200 2953

The time information in the event:

[01/Jul/2017:12:05:27 -0700]

is a timestamp.

Splunk software uses timestamps to correlate events by time, create the histogram in Splunk Web, and set time ranges for searches. Most events contain timestamps, and in those cases where an event does not contain timestamp information, Splunk software attempts to assign a timestamp value to the event at index time.

In most cases, Splunk software extracts timestamps correctly, but there are situations where you might need to configure timestamp handling. For example, when dealing with some sources or with distributed deployments, you might need to reconfigure timestamp recognition and formatting.

See the "Configure timestamps" chapter of this manual for specific instructions on how to configure timestamps.

Last modified on 07 August, 2019
Configure event line breaking
Configure indexed field extraction

This documentation applies to the following versions of Splunk Cloud: 7.0.11, 7.0.13, 8.0.2003, 7.2.10, 8.0.2004, 8.0.2006, 8.0.2007

Was this documentation topic helpful?

Enter your email address, and someone from the documentation team will respond to you:

Please provide your comments here. Ask a question or make a suggestion.

You must be logged into splunk.com in order to post comments. Log in now.

Please try to keep this discussion focused on the content covered in this documentation topic. If you have a more general question about Splunk functionality or are experiencing a difficulty with Splunk, consider posting a question to Splunkbase Answers.

0 out of 1000 Characters