1. Splunk Enterprise Documentation
Search Manual
"About default fields":
"Splunk software adds several fields to events at index time. These fields are the default fields... The time field is the event timestamp. This is an internal field." (Version 9.2.1
Section: Use default fields)
2. Splunk Enterprise Documentation
Getting Data In
"How timestamp assignment works":
"During the input phase
the Splunk platform gives each event a preliminary timestamp value. It stores this value in the time field... Splunk software stores timestamps in the time field in Coordinated Universal Time (UTC) format." (Version 9.2.1
Chapter: Configure event processing
Section: Configure timestamp recognition)
3. Splunk Enterprise Documentation
Search Reference
"Default fields":
"The following is a list of the fields that are added to events at index time... time: The timestamp of the event
stored in UNIX time." (Version 9.2.1
Chapter: About fields
Section: Default fields)