Splunk Search

Having trouble setting up delims-based field extraction, fields are not showing up

natrixia
Explorer

I have a simple script that returns some fields in TSV form that looks like this:

Date\tJobName\tCounterName\tValue 

for example:

Apr 14 13:00:00 2011    AlignmentMetrics    SpliCounter 0

I want the splunk indexing/search to pick up these fields (i.e. date, job, counter, value) so I added this to splunk/etc/system/local/props.conf:

[imd-log]
TRANSFORMS = imd-header-fields

And I added this to splunk/etc/system/local/transforms.conf:

[imd-header-fields]
DELIMS = "\t"
FIELDS = "date","job","counter","value"

I then restarted splunk, went to manager/data-inputs remove the job, and added it again with sourcetype=imd-logs. Trouble is in the search app I don't see any of the new fields anywhere. What am I doing wrong?

Tags (1)
1 Solution

David
Splunk Employee
Splunk Employee

Porting my answer to the new splunk-base:

I believe what you want in your props.conf is:

[imd-log]
REPORT-PullTSVFields = imd-header-fields

You also stated sourcetype=imd-logs whereas you have imd-log in the header. You'll need to make sure that the stanza header in props.conf matches your sourcetype exactly.

In the old answers site, you followed-up with:

Thank for the reply. Also, is there a way for splunk to replace it's internal date (i.e. the ones that shows up in the 'search' app) with the date specified by 'logdate'?)

Splunk should automatically pick that up. What are you seeing as the time when you do a search?

View solution in original post

David
Splunk Employee
Splunk Employee

Porting my answer to the new splunk-base:

I believe what you want in your props.conf is:

[imd-log]
REPORT-PullTSVFields = imd-header-fields

You also stated sourcetype=imd-logs whereas you have imd-log in the header. You'll need to make sure that the stanza header in props.conf matches your sourcetype exactly.

In the old answers site, you followed-up with:

Thank for the reply. Also, is there a way for splunk to replace it's internal date (i.e. the ones that shows up in the 'search' app) with the date specified by 'logdate'?)

Splunk should automatically pick that up. What are you seeing as the time when you do a search?

Get Updates on the Splunk Community!

Stay Connected: Your Guide to May Tech Talks, Office Hours, and Webinars!

Take a look below to explore our upcoming Community Office Hours, Tech Talks, and Webinars this month. This ...

They're back! Join the SplunkTrust and MVP at .conf24

With our highly anticipated annual conference, .conf, comes the fez-wearers you can trust! The SplunkTrust, as ...

Enterprise Security Content Update (ESCU) | New Releases

Last month, the Splunk Threat Research Team had two releases of new security content via the Enterprise ...