Indexed fields versus extracted fields

When an event is written to an index, the raw text of the event is captured along with a set of indexed fields. The default indexed fields include host, sourcetype, source, and _time. There are distinct advantages and a few serious disadvantages to using indexed fields.

First, let's look at the advantages of an indexed field (we will actually discuss configuring indexed fields in Chapter 11, Configuring Splunk):

Now for the disadvantages of an indexed field:

With the disadvantages out of our way, let's look at a few cases where an indexed field would improve search performances and then at one case where it would probably make no difference.