Getting Data In

Extracting multi-level host name

smhsplunk
Communicator

I would like to extract both directory and subdirectory information while importing data.

So basically the directory structure is like this

monitor:///data/host_name_first_part/host_name_second_part/*.gz

So in the input.conf I can use either host_segment=2 or host_segment=3
but cannot extract both the information, how can I extract both these information.

I am using unique index name for the data, sourcetype is defined in props.conf
how can extract the host names (separately) so that I can also use them in the search command
(i.e. I can use host_segment as host in the search command)

0 Karma

gcusello
SplunkTrust
SplunkTrust

You could use a rex command like this

rex field=source "data\/(?<Field1>\w+)\/(?<Field2>\w+)\/"

Bye.
Giuseppe

0 Karma

somesoni2
Revered Legend

You can setup search time field extraction (on your Search Head) to have both the segments extracted in separate fields. Once you've the field extraction setup, you can use them i the search.

See these for more info on field extraction

http://docs.splunk.com/Documentation/Splunk/6.4.3/Knowledge/Createandmaintainsearch-timefieldextract...
https://answers.splunk.com/answers/107529/best-way-to-create-a-search-time-field-extraction.html

Not sure if this is something which will work for you, but you can use host_regex in inputs.conf, instead of host_segment, to set the host with both the segment values.

0 Karma
Get Updates on the Splunk Community!

More Ways To Control Your Costs With Archived Metrics | Register for Tech Talk

Tuesday, May 14, 2024  |  11AM PT / 2PM ET Register to Attend Join us for this Tech Talk and learn how to ...

.conf24 | Personalize your .conf experience with Learning Paths!

Personalize your .conf24 Experience Learning paths allow you to level up your skill sets and dive deeper ...

Threat Hunting Unlocked: How to Uplevel Your Threat Hunting With the PEAK Framework ...

WATCH NOWAs AI starts tackling low level alerts, it's more critical than ever to uplevel your threat hunting ...