Skip to main content
Version: 3.3.0

Understanding Event Time

This section explains how Alert Manager Enterprise (AME) determines and adjusts an event’s Event Time.

Default Event Time

When a Splunk search is scheduled for periodic runs, it’s sent to the scheduler, which prioritizes jobs based on settings in savedsearches.conf and limits.conf.

Once executed, the search job includes metadata with key details, viewable in the Job Inspector or via the /services/jobs/<sid> endpoint.

For a Splunk Alert with an AME Alert Action, the Alert Action uses the searchTelemetry timestamp for maximum precision (note: the Job Inspector UI omits milliseconds). This timestamp becomes the Event Time, displayed in the first column of the Event Summary and the Alert Time column in the Data tab.

Timezones

Like Splunk, AME stores all timestamps in UTC Epoch format. The displayed time reflects the timezone set in a user’s Splunk preferences.

note

Selecting -- Default System Timezone -- sets the timezone to UTC.

Why UTC for Default System Timezone?

Converting an operating system’s timezone to IANA format in JavaScript is unreliable, so AME defaults to UTC. Users must manually set their preferred timezone for accurate display.

Overriding the Event Time

The default Event Time (search job timestamp) may not always suit alert management needs. For example, if an event originates from another alerting system and is indexed in Splunk, you might prefer the event’s _time over the job’s timestamp.

To override the Event Time, modify the search with:

  • | eval ame._time=_time (visible field), or
  • | eval _ame._time=_time (hidden field).

AME then uses this timestamp as the Event Time. The Alert Time in the Data tab remains the original alert firing timestamp.