<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Splunk App/Add-on for AWS: How to modify aws:s3 sourcetype? in All Apps and Add-ons</title>
    <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/Splunk-App-Add-on-for-AWS-How-to-modify-aws-s3-sourcetype/m-p/227385#M25199</link>
    <description>&lt;P&gt;you should just be able to set the sourcetype that the data is indexed as, then create props.conf and transforms.conf entries as you like for that sourcetype.&lt;/P&gt;

&lt;P&gt;Depending on what you mean by "the logs just stop working"...&lt;/P&gt;

&lt;UL&gt;
&lt;LI&gt;If they stop being indexed, your changes might be damaging the AWS Add-on's input configuration so that it can't get the logs from AWS anymore?&lt;/LI&gt;
&lt;LI&gt;If they are still getting indexed, but aren't showing up in the formats and/or dashboards that you're expecting, you might be facing a config error or a precedence problem?&lt;/LI&gt;
&lt;LI&gt;If they are no longer the expected content, but instead are media files containing Surrealist films, you might need to explain that it's a cold world for starving artists and that they'd better get back to work?&lt;/LI&gt;
&lt;/UL&gt;</description>
    <pubDate>Sun, 15 Nov 2015 00:15:01 GMT</pubDate>
    <dc:creator>jcoates_splunk</dc:creator>
    <dc:date>2015-11-15T00:15:01Z</dc:date>
    <item>
      <title>Splunk App/Add-on for AWS: How to modify aws:s3 sourcetype?</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/Splunk-App-Add-on-for-AWS-How-to-modify-aws-s3-sourcetype/m-p/227384#M25198</link>
      <description>&lt;P&gt;So we are using the aws add on to retrieve elb logs from a s3 bucket.  The logs are simply 1 event per a line.  But splunk is having trouble indexing them.  So the events look something like this:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;Svl
ES256-SHA TLSv1
--- "-"
18 HTTP/1.1" "WidgetSystem/6.1.3" AES256-SHA TLSv1
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;I tried to create a sourcetype to just take things as one line, but when I change sourcetype = aws:s3 to whatever I call my sourcetypes, all the logs just stop working until I change it back.  Is there a way to modify the aws:s3 sourcetype to take items as one event per log.  Or at least create a new sourcetype I can modify that will keep s3 logs flowing.&lt;/P&gt;</description>
      <pubDate>Fri, 13 Nov 2015 18:24:54 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/Splunk-App-Add-on-for-AWS-How-to-modify-aws-s3-sourcetype/m-p/227384#M25198</guid>
      <dc:creator>cwyse</dc:creator>
      <dc:date>2015-11-13T18:24:54Z</dc:date>
    </item>
    <item>
      <title>Re: Splunk App/Add-on for AWS: How to modify aws:s3 sourcetype?</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/Splunk-App-Add-on-for-AWS-How-to-modify-aws-s3-sourcetype/m-p/227385#M25199</link>
      <description>&lt;P&gt;you should just be able to set the sourcetype that the data is indexed as, then create props.conf and transforms.conf entries as you like for that sourcetype.&lt;/P&gt;

&lt;P&gt;Depending on what you mean by "the logs just stop working"...&lt;/P&gt;

&lt;UL&gt;
&lt;LI&gt;If they stop being indexed, your changes might be damaging the AWS Add-on's input configuration so that it can't get the logs from AWS anymore?&lt;/LI&gt;
&lt;LI&gt;If they are still getting indexed, but aren't showing up in the formats and/or dashboards that you're expecting, you might be facing a config error or a precedence problem?&lt;/LI&gt;
&lt;LI&gt;If they are no longer the expected content, but instead are media files containing Surrealist films, you might need to explain that it's a cold world for starving artists and that they'd better get back to work?&lt;/LI&gt;
&lt;/UL&gt;</description>
      <pubDate>Sun, 15 Nov 2015 00:15:01 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/Splunk-App-Add-on-for-AWS-How-to-modify-aws-s3-sourcetype/m-p/227385#M25199</guid>
      <dc:creator>jcoates_splunk</dc:creator>
      <dc:date>2015-11-15T00:15:01Z</dc:date>
    </item>
    <item>
      <title>Re: Splunk App/Add-on for AWS: How to modify aws:s3 sourcetype?</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/Splunk-App-Add-on-for-AWS-How-to-modify-aws-s3-sourcetype/m-p/227386#M25200</link>
      <description>&lt;P&gt;So I tried the props.conf as that is normally how I add sourcetypes. But what I mean by they stop working is that nothing gets indexed. You can see them coming in every minute until I restart the forwarders then it just stops. No new events, even when searching just by sourcetype. So I have a feeling your first bullet point is what is happening. But I would be pretty impressed if somehow my amazon ELBs started sending surrealist films. &lt;/P&gt;</description>
      <pubDate>Mon, 16 Nov 2015 18:23:18 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/Splunk-App-Add-on-for-AWS-How-to-modify-aws-s3-sourcetype/m-p/227386#M25200</guid>
      <dc:creator>cwyse</dc:creator>
      <dc:date>2015-11-16T18:23:18Z</dc:date>
    </item>
    <item>
      <title>Re: Splunk App/Add-on for AWS: How to modify aws:s3 sourcetype?</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/Splunk-App-Add-on-for-AWS-How-to-modify-aws-s3-sourcetype/m-p/227387#M25201</link>
      <description>&lt;P&gt;I have the exact same question. I want to define a custom sourcetype to be pulled from s3. Cant seem to make it work. &lt;/P&gt;</description>
      <pubDate>Wed, 17 Aug 2016 02:37:56 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/Splunk-App-Add-on-for-AWS-How-to-modify-aws-s3-sourcetype/m-p/227387#M25201</guid>
      <dc:creator>markconlin</dc:creator>
      <dc:date>2016-08-17T02:37:56Z</dc:date>
    </item>
    <item>
      <title>Re: Splunk App/Add-on for AWS: How to modify aws:s3 sourcetype?</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/Splunk-App-Add-on-for-AWS-How-to-modify-aws-s3-sourcetype/m-p/227388#M25202</link>
      <description>&lt;P&gt;FWIW, I just used the UI and it worked fine.&lt;/P&gt;</description>
      <pubDate>Thu, 15 Sep 2016 17:30:38 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/Splunk-App-Add-on-for-AWS-How-to-modify-aws-s3-sourcetype/m-p/227388#M25202</guid>
      <dc:creator>jcoates_splunk</dc:creator>
      <dc:date>2016-09-15T17:30:38Z</dc:date>
    </item>
    <item>
      <title>Re: Splunk App/Add-on for AWS: How to modify aws:s3 sourcetype?</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/Splunk-App-Add-on-for-AWS-How-to-modify-aws-s3-sourcetype/m-p/227389#M25203</link>
      <description>&lt;P&gt;You used the UI to add a custom source type to an s3 input and once it indexed data it implemented the rules in your custom sourcetype? Where did you define the custom sourcetype? &lt;/P&gt;</description>
      <pubDate>Thu, 15 Sep 2016 17:35:01 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/Splunk-App-Add-on-for-AWS-How-to-modify-aws-s3-sourcetype/m-p/227389#M25203</guid>
      <dc:creator>markconlin</dc:creator>
      <dc:date>2016-09-15T17:35:01Z</dc:date>
    </item>
    <item>
      <title>Re: Splunk App/Add-on for AWS: How to modify aws:s3 sourcetype?</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/Splunk-App-Add-on-for-AWS-How-to-modify-aws-s3-sourcetype/m-p/227390#M25204</link>
      <description>&lt;P&gt;I have the same problem. Overall configuration S3 input with AWS add-on is magic. Sometimes it works sometimes not. For sure once I change default sourcetype for S3 input from aws:s3 to cisco:umbrella:s3 (my name I chose) the input stops working. Nothing gets indexed. &lt;/P&gt;

&lt;P&gt;Having sourcetype named aws:s3 does not make sense. It's not sourcetype, it's basically a source. &lt;BR /&gt;
Any help?&lt;/P&gt;

&lt;P&gt;Tomas&lt;/P&gt;</description>
      <pubDate>Thu, 22 Jun 2017 15:30:17 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/Splunk-App-Add-on-for-AWS-How-to-modify-aws-s3-sourcetype/m-p/227390#M25204</guid>
      <dc:creator>tomasmoser</dc:creator>
      <dc:date>2017-06-22T15:30:17Z</dc:date>
    </item>
  </channel>
</rss>

