About indexed field extraction
When Splunk software indexes data, it parses the data stream into a series of events. As part of this process, the software adds a number of fields to the event data. These fields include default fields that it adds automatically, as well as any custom fields that you specify.
The process of adding fields to events is known as field extraction. There are two types of field extraction:
- Indexed field extraction, which takes place when the fields are stored in the index and become part of the event data. There are two types of indexed fields:
- Search-time field extraction, which takes place when you search through data. Splunk software creates those fields when compiling search results and does not store them in the index. For information about this type of field extraction, see About fields in the Knowledge Manager Manual.
When working with fields, consider that most machine data either doesn't have structure or has structure that changes constantly. For unstructured data, use search-time field extraction for maximum flexibility. Search-time field extraction is easy to modify after you define it.
Tune timestamp recognition for better indexing performance
About default fields (host, source, sourcetype, and more)
This documentation applies to the following versions of Splunk Cloud Platform™: 8.2.2112, 8.2.2202, 8.2.2203, 8.2.2201, 9.0.2205, 9.0.2208, 9.0.2209, 9.0.2303, 9.0.2305 (latest FedRAMP release), 9.1.2308