<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: IIS log fields (How to configure) in Getting Data In</title>
    <link>https://community.splunk.com/t5/Getting-Data-In/IIS-log-fields-How-to-configure/m-p/41006#M7602</link>
    <description>&lt;P&gt;Put this in you retc\system\local\transforms.conf&lt;/P&gt;

&lt;P&gt;[iis_fields]&lt;BR /&gt;
DELIMS=" "&lt;BR /&gt;
FIELDS="date","time","s-sitename","s-ip","cs-method","cs-uri-stem","cs-uri-query","s-port","cs-username","c-ip","cs-version","cs(User-Agent)","cs(Cookie)","cs(Referer)","cs-host","sc-status","sc-substatus","sc-win32-status","sc-bytes","cs-bytes","time-taken"&lt;/P&gt;</description>
    <pubDate>Fri, 22 Feb 2013 19:42:08 GMT</pubDate>
    <dc:creator>kmattern</dc:creator>
    <dc:date>2013-02-22T19:42:08Z</dc:date>
    <item>
      <title>IIS log fields (How to configure)</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/IIS-log-fields-How-to-configure/m-p/41000#M7596</link>
      <description>&lt;P&gt;I have been trying to figure out how to make IIS logs searchable in Splunk by IIS fields. We installed the latest version of the splunk agent and selected the IIS logs directory during the install. I went in and modified the inputs.conf in the MSICreated\Local folder as follows:&lt;/P&gt;

&lt;P&gt;[monitor://C:\inetpub\logs\logfiles\W3SVC1]&lt;BR /&gt;
                Disabled = false&lt;BR /&gt;
                Sourcetype=iis&lt;BR /&gt;
                ignoreOlderThan = 14d&lt;BR /&gt;
                host = servername.domain.com&lt;/P&gt;

&lt;P&gt;I can now see the IIS logs in the Spunk server, but I don't see that the fields are being properly identified. I have downloaded a couple of years work of logs and I would expect to be able to search by fields from the iis logs. For example: Shouldn't I be able to search by s-IP, since that field exists in the log?&lt;/P&gt;

&lt;P&gt;I have already checked props.conf on the Spunk server and it appears to be right given the following entries:&lt;/P&gt;

&lt;P&gt;[iis]&lt;BR /&gt;
pulldown_type = true&lt;BR /&gt;
MAX_TIMESTAMP_LOOKAHEAD = 32&lt;BR /&gt;
SHOULD_LINEMERGE = False&lt;BR /&gt;
CHECK_FOR_HEADER = True&lt;/P&gt;

&lt;P&gt;We are running Splunk 5.0.2 on UNIX. Logs are being forwarded with the current forwarder from a Windows 2008 box.&lt;/P&gt;</description>
      <pubDate>Mon, 28 Sep 2020 13:22:32 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/IIS-log-fields-How-to-configure/m-p/41000#M7596</guid>
      <dc:creator>josephrehling</dc:creator>
      <dc:date>2020-09-28T13:22:32Z</dc:date>
    </item>
    <item>
      <title>Re: IIS log fields (How to configure)</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/IIS-log-fields-How-to-configure/m-p/41001#M7597</link>
      <description>&lt;P&gt;I'm pretty sure that true/false is case sensitive.&lt;/P&gt;</description>
      <pubDate>Fri, 22 Feb 2013 18:03:39 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/IIS-log-fields-How-to-configure/m-p/41001#M7597</guid>
      <dc:creator>mikelanghorst</dc:creator>
      <dc:date>2013-02-22T18:03:39Z</dc:date>
    </item>
    <item>
      <title>Re: IIS log fields (How to configure)</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/IIS-log-fields-How-to-configure/m-p/41002#M7598</link>
      <description>&lt;P&gt;So are you saying it should be:&lt;/P&gt;

&lt;P&gt;[iis]&lt;BR /&gt;
pulldown_type = true&lt;BR /&gt;
MAX_TIMESTAMP_LOOKAHEAD = 32&lt;BR /&gt;
SHOULD_LINEMERGE = false&lt;BR /&gt;
CHECK_FOR_HEADER = true&lt;/P&gt;

&lt;P&gt;I didn't put in those lines (they were already there). Will it take a restart of splunk for those settings to take effect?&lt;/P&gt;</description>
      <pubDate>Mon, 28 Sep 2020 13:22:38 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/IIS-log-fields-How-to-configure/m-p/41002#M7598</guid>
      <dc:creator>josephrehling</dc:creator>
      <dc:date>2020-09-28T13:22:38Z</dc:date>
    </item>
    <item>
      <title>Re: IIS log fields (How to configure)</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/IIS-log-fields-How-to-configure/m-p/41003#M7599</link>
      <description>&lt;P&gt;I see other examples where the case is exactly the same as what I had initially. I have changed it and restarted splunk. It appears to have no impact either way. Can you tell me what I am missing?&lt;/P&gt;</description>
      <pubDate>Fri, 22 Feb 2013 19:21:57 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/IIS-log-fields-How-to-configure/m-p/41003#M7599</guid>
      <dc:creator>josephrehling</dc:creator>
      <dc:date>2013-02-22T19:21:57Z</dc:date>
    </item>
    <item>
      <title>Re: IIS log fields (How to configure)</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/IIS-log-fields-How-to-configure/m-p/41004#M7600</link>
      <description>&lt;P&gt;Hmm, I'd had a similar issue, but I've not indexed any IIS logs as of yet.  There's a similar question that someone setup their own extractions I'll link in seperate answer&lt;/P&gt;</description>
      <pubDate>Fri, 22 Feb 2013 19:26:24 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/IIS-log-fields-How-to-configure/m-p/41004#M7600</guid>
      <dc:creator>mikelanghorst</dc:creator>
      <dc:date>2013-02-22T19:26:24Z</dc:date>
    </item>
    <item>
      <title>Re: IIS log fields (How to configure)</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/IIS-log-fields-How-to-configure/m-p/41005#M7601</link>
      <description>&lt;P&gt;Looks like I was wrong above.  This is likely what you'll need, I'm not finding any default extractions setup.&lt;/P&gt;

&lt;P&gt;&lt;A href="http://splunk-base.splunk.com/answers/24986/iis-log-fields-not-parsing"&gt;http://splunk-base.splunk.com/answers/24986/iis-log-fields-not-parsing&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 22 Feb 2013 19:26:55 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/IIS-log-fields-How-to-configure/m-p/41005#M7601</guid>
      <dc:creator>mikelanghorst</dc:creator>
      <dc:date>2013-02-22T19:26:55Z</dc:date>
    </item>
    <item>
      <title>Re: IIS log fields (How to configure)</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/IIS-log-fields-How-to-configure/m-p/41006#M7602</link>
      <description>&lt;P&gt;Put this in you retc\system\local\transforms.conf&lt;/P&gt;

&lt;P&gt;[iis_fields]&lt;BR /&gt;
DELIMS=" "&lt;BR /&gt;
FIELDS="date","time","s-sitename","s-ip","cs-method","cs-uri-stem","cs-uri-query","s-port","cs-username","c-ip","cs-version","cs(User-Agent)","cs(Cookie)","cs(Referer)","cs-host","sc-status","sc-substatus","sc-win32-status","sc-bytes","cs-bytes","time-taken"&lt;/P&gt;</description>
      <pubDate>Fri, 22 Feb 2013 19:42:08 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/IIS-log-fields-How-to-configure/m-p/41006#M7602</guid>
      <dc:creator>kmattern</dc:creator>
      <dc:date>2013-02-22T19:42:08Z</dc:date>
    </item>
    <item>
      <title>Re: IIS log fields (How to configure)</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/IIS-log-fields-How-to-configure/m-p/41007#M7603</link>
      <description>&lt;P&gt;I think this is close. I made these changes to my props.conf and transforms.conf... I have noticed though that no matter what I put in the client inputs.conf, the server sees the sourcetype as iis-2...&lt;/P&gt;</description>
      <pubDate>Fri, 22 Feb 2013 19:55:57 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/IIS-log-fields-How-to-configure/m-p/41007#M7603</guid>
      <dc:creator>josephrehling</dc:creator>
      <dc:date>2013-02-22T19:55:57Z</dc:date>
    </item>
    <item>
      <title>Re: IIS log fields (How to configure)</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/IIS-log-fields-How-to-configure/m-p/41008#M7604</link>
      <description>&lt;P&gt;So I am guessing that the FIELDS section needs to match exactly the order from the sending file in order to work? So for each ISS log, I need a transforms.conf entry that tells splunk what each field and delimiter is? If that is the answer, this doesn't seem worth the trouble.&lt;/P&gt;</description>
      <pubDate>Fri, 22 Feb 2013 20:04:01 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/IIS-log-fields-How-to-configure/m-p/41008#M7604</guid>
      <dc:creator>josephrehling</dc:creator>
      <dc:date>2013-02-22T20:04:01Z</dc:date>
    </item>
    <item>
      <title>Re: IIS log fields (How to configure)</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/IIS-log-fields-How-to-configure/m-p/41009#M7605</link>
      <description>&lt;P&gt;Unless your iis logs are all different you should need only one transforms entry. I've been indexing iis for a couple of years with just this entry in my transforms.conf&lt;/P&gt;</description>
      <pubDate>Fri, 22 Feb 2013 20:12:23 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/IIS-log-fields-How-to-configure/m-p/41009#M7605</guid>
      <dc:creator>kmattern</dc:creator>
      <dc:date>2013-02-22T20:12:23Z</dc:date>
    </item>
    <item>
      <title>Re: IIS log fields (How to configure)</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/IIS-log-fields-How-to-configure/m-p/41010#M7606</link>
      <description>&lt;P&gt;So the final answer on this is a bit more complicated. I needed to set IIS first, then open a log and fine the header entry. I then used the header information in the IIS log to create the fields value. I also needed to change the CHECK_FOR_HEADER to false. One mistake I made is that I started forwarding logs before I understood how this works. I ingested 2GB of logs that don't match my final solution, so I would need to do a seperate field convertion for those logs if I wanted them field searchable.&lt;/P&gt;</description>
      <pubDate>Mon, 28 Sep 2020 13:24:33 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/IIS-log-fields-How-to-configure/m-p/41010#M7606</guid>
      <dc:creator>josephrehling</dc:creator>
      <dc:date>2020-09-28T13:24:33Z</dc:date>
    </item>
    <item>
      <title>Re: IIS log fields (How to configure)</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/IIS-log-fields-How-to-configure/m-p/41011#M7607</link>
      <description>&lt;P&gt;in that case put this in your props.conf and you'll be good to go.&lt;/P&gt;

&lt;P&gt;[iis-2]&lt;BR /&gt;
rename=iis&lt;/P&gt;</description>
      <pubDate>Wed, 27 Feb 2013 20:02:57 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/IIS-log-fields-How-to-configure/m-p/41011#M7607</guid>
      <dc:creator>kmattern</dc:creator>
      <dc:date>2013-02-27T20:02:57Z</dc:date>
    </item>
  </channel>
</rss>

