Configure event timestamps
This topic discusses how Splunk software handles timestamps.
Examine this sample event:
172.26.34.223 - - [01/Jul/2017:12:05:27 -0700] "GET /trade/app?action=logout HTTP/1.1" 200 2953
The time information in the event:
is a timestamp.
Splunk software uses timestamps to correlate events by time, create the histogram in Splunk Web, and set time ranges for searches. Most events contain timestamps, and in those cases where an event does not contain timestamp information, Splunk software attempts to assign a timestamp value to the event at index time.
In most cases, Splunk software extracts timestamps correctly, but there are situations where you might need to configure timestamp handling. For example, when dealing with some sources or with distributed deployments, you might need to reconfigure timestamp recognition and formatting.
See the "Configure timestamps" chapter of this manual for specific instructions on how to configure timestamps.
Configure event line breaking
Configure indexed field extraction
This documentation applies to the following versions of Splunk Cloud™: 7.0.11, 7.2.10, 7.0.13, 8.0.2003, 8.0.2004, 8.0.2006