<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: How Can I One-Time Index a File with &amp;quot;Normal&amp;quot; Processing? in Getting Data In</title>
    <link>https://community.splunk.com/t5/Getting-Data-In/How-Can-I-One-Time-Index-a-File-with-quot-Normal-quot-Processing/m-p/74267#M15179</link>
    <description>&lt;P&gt;Hi &lt;CODE&gt;'I am Jeff'&lt;/CODE&gt;&lt;/P&gt;

&lt;P&gt;yes, you can do this either with the CLI &lt;EM&gt;oneshot&lt;/EM&gt; command or spool it via the sinkhole directory. The data feed in there will be handled like any other log file. &lt;/P&gt;

&lt;P&gt;Find more on that topic &lt;A href="http://docs.splunk.com/Documentation/Splunk/4.2.3/Data/MonitorfilesanddirectoriesusingtheCLI"&gt;here&lt;/A&gt;&lt;/P&gt;</description>
    <pubDate>Wed, 14 Sep 2011 06:07:04 GMT</pubDate>
    <dc:creator>MuS</dc:creator>
    <dc:date>2011-09-14T06:07:04Z</dc:date>
    <item>
      <title>How Can I One-Time Index a File with "Normal" Processing?</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/How-Can-I-One-Time-Index-a-File-with-quot-Normal-quot-Processing/m-p/74266#M15178</link>
      <description>&lt;P&gt;Short statement:  I want to one-time import a file to splunk and have the events processed/indexed/identified/tagged as if it was my normal log file.  &lt;/P&gt;

&lt;P&gt;Splunk is my enterprise logger and is happily indexing my monitored files, one of which is /opt/apps/splunk-index01/splunk-log.  The file is written by syslog-ng.  The events are identified by host, actually IPs, and source and sourcetype.  Everything you'd expect from Splunk.  Many of my users rely on searching by host and sourcetype.&lt;/P&gt;

&lt;P&gt;I have a snippet of a log file.  (It's a &lt;EM&gt;big&lt;/EM&gt; snippet.)  &lt;EM&gt;Exact same format as is generated by the exact same syslog-ng daemon&lt;/EM&gt;. It contains events from multiple other devices.  Everything you'd get from the "normal" syslog file.&lt;/P&gt;

&lt;P&gt;If I do a one-shot index of the file, every host is identified incorrectly as host=splp01.  Every sourcetype is incorrectly identified as the file-name, sourcetype=splunk-log  &lt;/P&gt;

&lt;P&gt;I want this snippet processed as the &lt;EM&gt;normal&lt;/EM&gt; splunk-log file is processed.  It already should go to the default index.  It should correctly identify which host the event belongs to.  It should correctly determine the sourcetype: broadsoft, cisco-asa, syslog, netscreen-fw, cisco-pix, F5, etc.&lt;/P&gt;

&lt;P&gt;As a nice-to-have, but not a need-to-have, I'd like to have the source listed as /opt/apps/splunk-index01/splunk-log.&lt;/P&gt;

&lt;P&gt;Can I do this?  I wouldn't mind reconfiguring my normal data inputs if necessary.&lt;/P&gt;

&lt;P&gt;Splunk 4.1.5.  Solaris 10.&lt;/P&gt;</description>
      <pubDate>Tue, 13 Sep 2011 15:39:34 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/How-Can-I-One-Time-Index-a-File-with-quot-Normal-quot-Processing/m-p/74266#M15178</guid>
      <dc:creator>I_am_Jeff</dc:creator>
      <dc:date>2011-09-13T15:39:34Z</dc:date>
    </item>
    <item>
      <title>Re: How Can I One-Time Index a File with "Normal" Processing?</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/How-Can-I-One-Time-Index-a-File-with-quot-Normal-quot-Processing/m-p/74267#M15179</link>
      <description>&lt;P&gt;Hi &lt;CODE&gt;'I am Jeff'&lt;/CODE&gt;&lt;/P&gt;

&lt;P&gt;yes, you can do this either with the CLI &lt;EM&gt;oneshot&lt;/EM&gt; command or spool it via the sinkhole directory. The data feed in there will be handled like any other log file. &lt;/P&gt;

&lt;P&gt;Find more on that topic &lt;A href="http://docs.splunk.com/Documentation/Splunk/4.2.3/Data/MonitorfilesanddirectoriesusingtheCLI"&gt;here&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 14 Sep 2011 06:07:04 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/How-Can-I-One-Time-Index-a-File-with-quot-Normal-quot-Processing/m-p/74267#M15179</guid>
      <dc:creator>MuS</dc:creator>
      <dc:date>2011-09-14T06:07:04Z</dc:date>
    </item>
    <item>
      <title>Re: How Can I One-Time Index a File with "Normal" Processing?</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/How-Can-I-One-Time-Index-a-File-with-quot-Normal-quot-Processing/m-p/74268#M15180</link>
      <description>&lt;P&gt;The problem is the oneshot will label all event as being from a single host.  I need something that will process the event: assign correct host, assign correct sourcetype.&lt;/P&gt;

&lt;P&gt;I have had some luck with reconfiguring the data imput on Splunk to be something like /var/log/messages* and dropping in a file named /var/log/messages.importme.  It gets the hostname, but I still don't have the sourcetypes correct.&lt;/P&gt;</description>
      <pubDate>Thu, 22 Sep 2011 13:25:49 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/How-Can-I-One-Time-Index-a-File-with-quot-Normal-quot-Processing/m-p/74268#M15180</guid>
      <dc:creator>I_am_Jeff</dc:creator>
      <dc:date>2011-09-22T13:25:49Z</dc:date>
    </item>
  </channel>
</rss>

