<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Windows TA - MultiKV fields in All Apps and Add-ons</title>
    <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/Windows-TA-MultiKV-fields/m-p/655549#M79682</link>
    <description>&lt;P&gt;Thanks for the mention. This person definitely needs to watch my conf talk.&lt;/P&gt;&lt;P&gt;&lt;A href="https://conf.splunk.com/files/2023/recordings/PLA1163C.mp4" target="_blank"&gt;https://conf.splunk.com/files/2023/recordings/PLA1163C.mp4&lt;/A&gt;&lt;/P&gt;</description>
    <pubDate>Thu, 24 Aug 2023 21:09:34 GMT</pubDate>
    <dc:creator>Brett</dc:creator>
    <dc:date>2023-08-24T21:09:34Z</dc:date>
    <item>
      <title>Windows TA - MultiKV fields</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/Windows-TA-MultiKV-fields/m-p/580184#M75849</link>
      <description>&lt;P&gt;Hi all,&amp;nbsp;&lt;/P&gt;&lt;P&gt;I want to know how splunk extracts fields from TA_windows inputs when mode=multikv&amp;nbsp;&lt;/P&gt;&lt;P&gt;The _raw event does not seem to have any sort of field indicator (as compared to events from TA_nix which has headers)&amp;nbsp;&lt;/P&gt;&lt;P&gt;As an example:&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Splunk_TA_windows/local/inputs.conf&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;[perfmon://Network-Bytes]
disabled = false
counters = Bytes Total/sec; Bytes Received/sec; Bytes Sent/sec; 
interval = 60
mode = multikv
index = perfmon
useEnglishOnly = true
object = Network Interface
sourcetype = PerfmonMk:Network&lt;/LI-CODE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;gives _raw events as seen indexed in Splunk:&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;vmxnet3_Ethernet_Adapter 19069.926362422757 11044.290764991998 8025.635597430761
vmxnet3_Ethernet_Adapter 26173.569591676503 15701.614528029395 10471.95506364711
vmxnet3_Ethernet_Adapter 28654.246470518276 17482.977608482255 11171.268862036022&lt;/LI-CODE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;From this output, splunk magically extracts fields like:&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;Bytes_Received/sec
Bytes_Sent/sec
Bytes_Total/sec
instance
category
collection&lt;/LI-CODE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I checked the TA_windows configs and ran btool, but could not trace configs other than some standard PerfmonMk:&amp;lt;object&amp;gt; stanzas in&amp;nbsp;Splunk_TA_windows/default/props.conf which contain&amp;nbsp;only FIELDALIAS settings&lt;/P&gt;&lt;P&gt;What am I missing?&lt;BR /&gt;How does splunk know which field is which?&amp;nbsp;&lt;BR /&gt;How does it even get values for category &amp;amp; collection when those values are not even present in the _raw?&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;LI-SPOILER&gt;&lt;P&gt;Further comparison,&amp;nbsp;TA_nix add-on does this in a much more legible manner (which can be easily understood and played around with) like:&amp;nbsp;&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;Name rxPackets_PS txPackets_PS rxKB_PS txKB_PS
eth0 1024.00 1972.50 1415.04 674.94
​&lt;/LI-CODE&gt;&lt;LI-CODE lang="markup"&gt;&lt;/LI-CODE&gt;&amp;nbsp;&lt;/LI-SPOILER&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Additional:&amp;nbsp;&lt;/P&gt;&lt;LI-SPOILER&gt;I want to convert the PerfmonMk events to metrics, has anyone attempted that?&amp;nbsp;&lt;/LI-SPOILER&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 07 Jan 2022 00:24:46 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/Windows-TA-MultiKV-fields/m-p/580184#M75849</guid>
      <dc:creator>anirban_td</dc:creator>
      <dc:date>2022-01-07T00:24:46Z</dc:date>
    </item>
    <item>
      <title>Re: Windows TA - MultiKV fields</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/Windows-TA-MultiKV-fields/m-p/580188#M75851</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/236876"&gt;@anirban_td&lt;/a&gt;&amp;nbsp;.. i am not much sure of WindowsTA, but, one thing for sure - the windows logs are pretty much formatted.&lt;/P&gt;&lt;P&gt;so, headers may not be needed at all. hope you understand my view, thanks.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 07 Jan 2022 02:31:19 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/Windows-TA-MultiKV-fields/m-p/580188#M75851</guid>
      <dc:creator>inventsekar</dc:creator>
      <dc:date>2022-01-07T02:31:19Z</dc:date>
    </item>
    <item>
      <title>Re: Windows TA - MultiKV fields</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/Windows-TA-MultiKV-fields/m-p/580205#M75853</link>
      <description>&lt;P&gt;index time field extractions and mappings are all done in props and transforms.conf.&lt;/P&gt;</description>
      <pubDate>Fri, 07 Jan 2022 05:52:38 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/Windows-TA-MultiKV-fields/m-p/580205#M75853</guid>
      <dc:creator>SinghK</dc:creator>
      <dc:date>2022-01-07T05:52:38Z</dc:date>
    </item>
    <item>
      <title>Re: Windows TA - MultiKV fields</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/Windows-TA-MultiKV-fields/m-p/580206#M75854</link>
      <description>&lt;P&gt;i see you have customized inputs :&lt;/P&gt;&lt;P&gt;this is thedefault one&lt;/P&gt;&lt;P&gt;## Network&lt;BR /&gt;[perfmon://Network]&lt;BR /&gt;counters = Bytes Total/sec; Packets/sec; Packets Received/sec; Packets Sent/sec; Current Bandwidth; Bytes Received/sec; Packets Received Unicast/sec; Packets Received Non-Unicast/sec; Packets Received Discarded; Packets Received Errors; Packets Received Unknown; Bytes Sent/sec; Packets Sent Unicast/sec; Packets Sent Non-Unicast/sec; Packets Outbound Discarded; Packets Outbound Errors; Output Queue Length; Offloaded Connections; TCP Active RSC Connections; TCP RSC Coalesced Packets/sec; TCP RSC Exceptions/sec; TCP RSC Average Packet Size&lt;BR /&gt;disabled = 1&lt;BR /&gt;instances = *&lt;BR /&gt;interval = 10&lt;BR /&gt;mode = multikv&lt;BR /&gt;object = Network Interface&lt;BR /&gt;useEnglishOnly=true&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;you have customized sourcetype. I will not do that, as there is a lot more working on standard sourcetype in a addon behind the scenes during indexing time.&lt;/P&gt;</description>
      <pubDate>Fri, 07 Jan 2022 05:57:25 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/Windows-TA-MultiKV-fields/m-p/580206#M75854</guid>
      <dc:creator>SinghK</dc:creator>
      <dc:date>2022-01-07T05:57:25Z</dc:date>
    </item>
    <item>
      <title>Re: Windows TA - MultiKV fields</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/Windows-TA-MultiKV-fields/m-p/580271#M75862</link>
      <description>&lt;P&gt;again, taking the example of TA_nix bandwidth.sh event:&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;Name rxPackets_PS txPackets_PS rxKB_PS txKB_PS
eth0 1024.00 1972.50 1415.04 674.94&lt;/LI-CODE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;one can easily recognize (and setup extraction mechanisms for) the fields because of the header row...&amp;nbsp;&lt;BR /&gt;however, if the header row is not there, how do you do it?&amp;nbsp;&lt;/P&gt;&lt;P&gt;-----------------------------------------------------------------------------------------------&lt;/P&gt;&lt;P&gt;i agree the multikv events are well formatted&lt;/P&gt;&lt;P&gt;but i still do not understand how splunk:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;recognizes the fields correctly in absence of a header row&lt;/LI&gt;&lt;LI&gt;&lt;SPAN&gt;get values for category &amp;amp; collection when those values are not present in the _raw event&lt;/SPAN&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;the only logical explanation that i can arrive at is: the header row (or something similar, which aids splunk in identifying the fields) is generated at the UF level; but once the event reaches the indexer tier, it is discarded after field extraction, to save license cost &amp;amp; disk space..&amp;nbsp;&lt;/P&gt;&lt;P&gt;i want to know :&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;if this assumption is correct&lt;/LI&gt;&lt;LI&gt;the config that processes the PerfmonMk:&amp;lt;&amp;gt; sourcetypes&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;----------------------------------------------------------------------------&lt;/P&gt;&lt;P&gt;i am sure i am missing SOMETHING here..&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 07 Jan 2022 14:42:15 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/Windows-TA-MultiKV-fields/m-p/580271#M75862</guid>
      <dc:creator>anirban_td</dc:creator>
      <dc:date>2022-01-07T14:42:15Z</dc:date>
    </item>
    <item>
      <title>Re: Windows TA - MultiKV fields</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/Windows-TA-MultiKV-fields/m-p/580274#M75863</link>
      <description>&lt;BLOCKQUOTE&gt;&lt;HR /&gt;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/228600"&gt;@SinghK&lt;/a&gt;&amp;nbsp;wrote:&lt;BR /&gt;&lt;P&gt;you have customized sourcetype. I will not do that, as there is a lot more working on standard sourcetype in a addon behind the scenes during indexing time.&lt;/P&gt;&lt;HR /&gt;&lt;/BLOCKQUOTE&gt;&lt;P&gt;i have explicitly mentioned the sourcetype to use in the input, but i have not customised the sourcetype definition&lt;/P&gt;&lt;P&gt;regardless, my question is specifically on the 'behind the scenes' processing that goes on for mode=multikv&amp;nbsp;&lt;/P&gt;&lt;P&gt;please see my reply to&amp;nbsp;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/80737"&gt;@inventsekar&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;PS: if you have any standard best practices for defining TA_windows inputs, feel free to share them..&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 07 Jan 2022 14:46:41 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/Windows-TA-MultiKV-fields/m-p/580274#M75863</guid>
      <dc:creator>anirban_td</dc:creator>
      <dc:date>2022-01-07T14:46:41Z</dc:date>
    </item>
    <item>
      <title>Re: Windows TA - MultiKV fields</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/Windows-TA-MultiKV-fields/m-p/655547#M79680</link>
      <description>&lt;P&gt;I will sum up what I learned about this from&amp;nbsp;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/193014"&gt;@Brett&lt;/a&gt;'s session titled "&lt;SPAN&gt;PLA1163C - Perfecting Perfmon and Other Metrics"&amp;nbsp;&lt;/SPAN&gt;at .Conf 2023 below.&amp;nbsp;&amp;nbsp;&lt;A href="https://conf.splunk.com/watch/conf-online.html?search=PLA1163C#/" target="_blank"&gt;.conf Online | .conf23 | Splunk&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;When mode is set to multikv, Splunk combines all of the counters and instances for an object into one event on disk.&amp;nbsp; It does this to be more efficient and save disk space.&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;When searching, Splunk will automatically convert this one event on disk to separate events for each instance (it does this for events based on their PerfmonMk prefixed source or sourcetype.)&lt;BR /&gt;&lt;BR /&gt;To test this out yourself, you can temporarily set the source and sourcetype for a Perfmon stanza in multikv mode to something like test, and Splunk will not conert it into separate events by instance. The screen shot below shows an example where I set the source and sourcetype to "test" on the UF (so Splunk would not break it up and you can actually see the headers in the single tab-separated event containing all of the instances in addition to the collection and category fields).&lt;/P&gt;</description>
      <pubDate>Thu, 24 Aug 2023 20:58:06 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/Windows-TA-MultiKV-fields/m-p/655547#M79680</guid>
      <dc:creator>gn694</dc:creator>
      <dc:date>2023-08-24T20:58:06Z</dc:date>
    </item>
    <item>
      <title>Re: Windows TA - MultiKV fields</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/Windows-TA-MultiKV-fields/m-p/655549#M79682</link>
      <description>&lt;P&gt;Thanks for the mention. This person definitely needs to watch my conf talk.&lt;/P&gt;&lt;P&gt;&lt;A href="https://conf.splunk.com/files/2023/recordings/PLA1163C.mp4" target="_blank"&gt;https://conf.splunk.com/files/2023/recordings/PLA1163C.mp4&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 24 Aug 2023 21:09:34 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/Windows-TA-MultiKV-fields/m-p/655549#M79682</guid>
      <dc:creator>Brett</dc:creator>
      <dc:date>2023-08-24T21:09:34Z</dc:date>
    </item>
    <item>
      <title>Re: Windows TA - MultiKV fields</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/Windows-TA-MultiKV-fields/m-p/655550#M79683</link>
      <description>&lt;P&gt;FYI there are no index time field extractions on mode=multikv&lt;/P&gt;&lt;P&gt;There are on mode=single but they are for metric store.&lt;/P&gt;</description>
      <pubDate>Thu, 24 Aug 2023 21:07:37 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/Windows-TA-MultiKV-fields/m-p/655550#M79683</guid>
      <dc:creator>Brett</dc:creator>
      <dc:date>2023-08-24T21:07:37Z</dc:date>
    </item>
  </channel>
</rss>

