Splunk Search

Can someone tell me what's wrong with my source type rename?

daniel333
Builder

All,

I am trying to rename a subsect of logs. I am expecting the logs to get their source type renamed. But they remain WinEventLog:Application instread of Trend.

[WinEventLog:Application]
TRANSFORMS-wintrans = idx2trend,st2trend,route_stubhinfo_to_es_TU

[st2trend]
REGEX = Trend Micro OfficeScan Server[\S\s]+product_version
DEST_KEY = MetaData:Sourcetype
FORMAT = sourcetype::trend

0 Karma

ddrillic
Ultra Champion

It looks clean what you did. I would try maybe -

REGEX = (?m)^EventCode=(xxx|yyy)
0 Karma

FrankVl
Ultra Champion

Not sure exactly how you are collecting this data, but if that is with standard wineventlog inputs, I believe that sourcetype is already a transformed sourcetype and that process only runs once.

So you need to find the base sourcetype used by the windows TA. I believe that is WinEventLog and use that in your props.conf stanza.

0 Karma
Get Updates on the Splunk Community!

Webinar Recap | Revolutionizing IT Operations: The Transformative Power of AI and ML ...

The Transformative Power of AI and ML in Enhancing Observability   In the realm of IT operations, the ...

.conf24 | Registration Open!

Hello, hello! I come bearing good news: Registration for .conf24 is now open!   conf is Splunk’s rad annual ...

ICYMI - Check out the latest releases of Splunk Edge Processor

Splunk is pleased to announce the latest enhancements to Splunk Edge Processor.  HEC Receiver authorization ...