Getting Data In

Splunk search doesn't extract fields on the forwarded data

kpragasam
New Member

Our forwarder sends the data to the Splunk Server & our config in the Splunk Server & forwarder looks like below. For some reason, when I do the search in the SPLUNK, it's not extracting the fields. Can anyone help us out??

**In Splunk Server:**
*transforms.conf*

[portal_eventlog_host]
REGEX = <computer>?(.*)</computer>
FORMAT = host::$1
DEST_KEY = MetaData:Host

*props.conf*

[iis_custom]
category = Web
description = W3C Extended log format produced by the Microsoft Internet Information Services (IIS) web server
SHOULD_LINEMERGE = False
pulldown_type = true
MAX_TIMESTAMP_LOOKAHEAD = 32
INDEXED_EXTRACTIONS = w3c
detect_trailing_nulls = auto
FIELD_DELIMITER = whitespace
FIELD_HEADER_REGEX = ^#Fields:\s*(.*)
MISSING_VALUE_REGEX = -
TIME_FORMAT = %Y-%m-%d %H:%M:%S
TZ = GMT
TIMESTAMP_FIELDS = date,time

[portal_eventlog]
category = Application
description = Portal event logs
disabled = false
pulldown_type = true
SHOULD_LINEMERGE = false
NO_BINARY_CHECK = true
LINE_BREAKER = (<log>|</log>)
TIME_PREFIX = datetime
SEDCMD-format-text = s/<(\/{1}\w+)>/<\1>\n/g
TRANSFORMS-hostname = portal_eventlog_host
KV_MODE = xml

**In Forwarder:**
*inputs.conf*

[monitor://C:\TestLogs\IIS]
disabled = false
index = dotnet
sourcetype = iis_custom

[monitor://C:\TestLogs\PortalEventLog]
disabled = false
index = dotnet
sourcetype = portal_eventlog
crcSalt = <SOURCE>
0 Karma

skoelpin
SplunkTrust
SplunkTrust

What fields are not extracting? By default, it will extract all fields with some type of delimiter between values at search-time. How many fields do you currently have extracted? Do the fields you want have some type of delimiter between the key value pair in the event? If not, you will have to write some regex to get the field.

Remember that fields are relative to sourcetype

0 Karma

kpragasam
New Member

For "Portal_eventlog" sourcetype, I am seeing only the standards fields such as host, index, source, sourcetype, linecount, splunk_server. The log file is an XML. So, I am expecting each tag as a fields.

Note: Some people mentioned that we have to have props & transform.config in the forwarder too. I have tried that too & didn't work.

0 Karma

sshelly_splunk
Splunk Employee
Splunk Employee

I apoligize if this seems like a stupid question :), but do you have a single splunk instance (indexer and search head are the same)? If distributed, you will need the props/etc on all instance (search heads and indexers).

0 Karma

kpragasam
New Member

It's distributed. We do have the props & transform configs in both indexer & SearchHead. But, that doesn't seems to help

0 Karma
Get Updates on the Splunk Community!

.conf24 | Registration Open!

Hello, hello! I come bearing good news: Registration for .conf24 is now open!   conf is Splunk’s rad annual ...

ICYMI - Check out the latest releases of Splunk Edge Processor

Splunk is pleased to announce the latest enhancements to Splunk Edge Processor.  HEC Receiver authorization ...

Introducing the 2024 SplunkTrust!

Hello, Splunk Community! We are beyond thrilled to announce our newest group of SplunkTrust members!  The ...