Splunk Search

Index-time field extraction issue

perezcla
New Member

Hello all,

I'm a bit stuck with my issue.
I do have this splunk infra :
Sources ==> UF ==> Indexer cluster (3 + master) Search head cluster.

I'm trying to extract fields at index time to transform it in a future.

My props.conf and transfroms.conf are deployed in indexers throught the master.

log line look like :
date="2017-09-08",time="08:08:00",s-ip="8.8.8.8",time-taken="8",c-ip="9.9.9.9",c-port="45687",s-action="TCP_DENIED",cs-user="foobar"

transforms.conf

[fieldtestextract]
WRITE_META = true
REGEX=cs-user="([^"]+)
FORMAT=csuser::$1

props.conf

[web:access:file]
TRANSFORMS-csuser = fieldtestextract
TZ = utc
SEDCMD-username =  s/,cs-user=\"[^\"]+\",/,cs-user="xxxx",/g

The SEDCMD is working like a charm but the tranforms won't work...
fields.conf on search heads :

[csuser]
INDEXED = true
INDEXED_VALUE = true

I don't see my field on search head and obsiously i'm not able to execute query against it.

Could you help me figuring out what's wrong with my configuration ?

Many thanks in advance.

0 Karma

perezcla
New Member

I have found my mistake... my transforms file was named transform.conf (no S ...) It 's now working 🙂

0 Karma

DalJeanis
Legend

@perezcla - thanks for posting your solution. We've moved your comment to an answer. Please accept your answer so that the question will show as closed. - dal

Get Updates on the Splunk Community!

More Ways To Control Your Costs With Archived Metrics | Register for Tech Talk

Tuesday, May 14, 2024  |  11AM PT / 2PM ET Register to Attend Join us for this Tech Talk and learn how to ...

.conf24 | Personalize your .conf experience with Learning Paths!

Personalize your .conf24 Experience Learning paths allow you to level up your skill sets and dive deeper ...

Threat Hunting Unlocked: How to Uplevel Your Threat Hunting With the PEAK Framework ...

WATCH NOWAs AI starts tackling low level alerts, it's more critical than ever to uplevel your threat hunting ...