<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Fields aren't being parse correclty in Splunk Enterprise</title>
    <link>https://community.splunk.com/t5/Splunk-Enterprise/Fields-aren-t-being-parse-correclty/m-p/336672#M931</link>
    <description>&lt;P&gt;Oh woops, missed that part. &lt;/P&gt;</description>
    <pubDate>Sat, 10 Mar 2018 22:45:43 GMT</pubDate>
    <dc:creator>hortonew</dc:creator>
    <dc:date>2018-03-10T22:45:43Z</dc:date>
    <item>
      <title>Fields aren't being parse correclty</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise/Fields-aren-t-being-parse-correclty/m-p/336667#M926</link>
      <description>&lt;P&gt;I am using Universal Forward to collect Windows Security logs from my Domain Controllers.  All the logs were being dumped into the "default" (main) index, and we wanted to move to a new index.&lt;/P&gt;

&lt;P&gt;I created a new index called "windows".  I changed the "c:\Program Files\SplunkUniversalForwarder\etc\system\local\inputs.conf"  file on the DCs and modified as such:&lt;BR /&gt;
&lt;PRE&gt;&lt;BR /&gt;
    [default]&lt;BR /&gt;
    host = DCHostName&lt;BR /&gt;
    [WinEventLog://Security]&lt;BR /&gt;
    index=windows&lt;BR /&gt;
&lt;/PRE&gt;&lt;/P&gt;

&lt;P&gt;I restarted the Universal Forwarder service.  I confirmed that the new events are being written to the new index.  That is working correctly.&lt;/P&gt;

&lt;P&gt;I wanted to move the "old" logs that has been written to the "main" index to the "windows" index, so I used this command:&lt;BR /&gt;
&lt;PRE&gt;&lt;BR /&gt;
index=main  AND sourcetype="WinEventLog:Security" | collect index=windows sourcetype="WinEventLog:Security"&lt;BR /&gt;
&lt;/PRE&gt;&lt;/P&gt;

&lt;P&gt;I verified that all the logs moved by comparing the count:&lt;BR /&gt;
&lt;PRE&gt;&lt;BR /&gt;
(index=main  OR index=windows) AND sourcetype="WinEventLog:Security" | stats count(EventCode) by index&lt;BR /&gt;
&lt;/PRE&gt;&lt;/P&gt;

&lt;P&gt;Since all the logs, moved, I deleted the logs from the main index"&lt;BR /&gt;
&lt;PRE&gt;&lt;BR /&gt;
index=main  AND sourcetype="WinEventLog:Security" | delete&lt;BR /&gt;
&lt;/PRE&gt;&lt;/P&gt;

&lt;P&gt;However, I discovered several of the fields are being parsed/index/identified correctly.   For example, Account_Name is NULL, and Keywords is NULL for all of the logs that were moved from main index to windows index.  New logs that are written are being indexed/parsed/identified correctly.&lt;/P&gt;

&lt;P&gt;Did I miss a step?  shouldn't all of the fields that were moved from the "main" index be indexed in the "windows" index?  They were properly index/parsed/identified before I moved from main.  &lt;/P&gt;

&lt;P&gt;&lt;STRONG&gt;All of my dashboards and reports that were correct previously, are blank or incorrect now - because the field value pairs aren't being properly identified.&lt;/STRONG&gt;&lt;/P&gt;

&lt;P&gt;Thanks for any help can provide!&lt;/P&gt;</description>
      <pubDate>Fri, 09 Mar 2018 05:02:45 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise/Fields-aren-t-being-parse-correclty/m-p/336667#M926</guid>
      <dc:creator>ksbuchanan</dc:creator>
      <dc:date>2018-03-09T05:02:45Z</dc:date>
    </item>
    <item>
      <title>Re: Fields aren't being parse correclty</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise/Fields-aren-t-being-parse-correclty/m-p/336668#M927</link>
      <description>&lt;P&gt;I believe by default when using the collect command, your sourcetype becomes "stash" as seen in the documentation for the collect command.  The Windows_TA that does search time field extraction by default uses the sourcetype as part of field extraction.  Your old data probably has this sourcetype of stash which is why fields aren't being extracted correctly.  The new data coming in will have the sourcetype specified at the inputs level. &lt;/P&gt;</description>
      <pubDate>Sat, 10 Mar 2018 17:53:14 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise/Fields-aren-t-being-parse-correclty/m-p/336668#M927</guid>
      <dc:creator>hortonew</dc:creator>
      <dc:date>2018-03-10T17:53:14Z</dc:date>
    </item>
    <item>
      <title>Re: Fields aren't being parse correclty</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise/Fields-aren-t-being-parse-correclty/m-p/336669#M928</link>
      <description>&lt;P&gt;No stash when using&lt;BR /&gt;
| collect index=windows sourcetype="WinEventLog:Security"&lt;/P&gt;</description>
      <pubDate>Sat, 10 Mar 2018 22:31:11 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise/Fields-aren-t-being-parse-correclty/m-p/336669#M928</guid>
      <dc:creator>valiquet</dc:creator>
      <dc:date>2018-03-10T22:31:11Z</dc:date>
    </item>
    <item>
      <title>Re: Fields aren't being parse correclty</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise/Fields-aren-t-being-parse-correclty/m-p/336670#M929</link>
      <description>&lt;P&gt;|collect write data to indexers without going through the parsing queue. So all index time extractions are gone.&lt;/P&gt;

&lt;P&gt;You can configure search time extractions inside props.conf or with |rex  &lt;/P&gt;

&lt;P&gt;If this do not work, share your props and transforms&lt;/P&gt;</description>
      <pubDate>Sat, 10 Mar 2018 22:33:28 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise/Fields-aren-t-being-parse-correclty/m-p/336670#M929</guid>
      <dc:creator>valiquet</dc:creator>
      <dc:date>2018-03-10T22:33:28Z</dc:date>
    </item>
    <item>
      <title>Re: Fields aren't being parse correclty</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise/Fields-aren-t-being-parse-correclty/m-p/336671#M930</link>
      <description>&lt;P&gt;Just looked at the way we have been doing things with &lt;CODE&gt;collect&lt;/CODE&gt; and we always use the &lt;CODE&gt;table&lt;/CODE&gt; command before the &lt;CODE&gt;collect&lt;/CODE&gt; command, listing the fields we want to move over. Not sure whether &lt;CODE&gt;table&lt;/CODE&gt; is truly needed...&lt;/P&gt;</description>
      <pubDate>Sat, 10 Mar 2018 22:37:42 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise/Fields-aren-t-being-parse-correclty/m-p/336671#M930</guid>
      <dc:creator>ddrillic</dc:creator>
      <dc:date>2018-03-10T22:37:42Z</dc:date>
    </item>
    <item>
      <title>Re: Fields aren't being parse correclty</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise/Fields-aren-t-being-parse-correclty/m-p/336672#M931</link>
      <description>&lt;P&gt;Oh woops, missed that part. &lt;/P&gt;</description>
      <pubDate>Sat, 10 Mar 2018 22:45:43 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise/Fields-aren-t-being-parse-correclty/m-p/336672#M931</guid>
      <dc:creator>hortonew</dc:creator>
      <dc:date>2018-03-10T22:45:43Z</dc:date>
    </item>
    <item>
      <title>Re: Fields aren't being parse correclty</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise/Fields-aren-t-being-parse-correclty/m-p/336673#M932</link>
      <description>&lt;P&gt;yeah...I also discovered (hard way) that the "host" field was lost during the "move/copy".  We only have about 30 days...I'm about to write it off.&lt;/P&gt;</description>
      <pubDate>Tue, 13 Mar 2018 20:06:24 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise/Fields-aren-t-being-parse-correclty/m-p/336673#M932</guid>
      <dc:creator>ksbuchanan</dc:creator>
      <dc:date>2018-03-13T20:06:24Z</dc:date>
    </item>
  </channel>
</rss>

