<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Index Time field extraction in Splunk Search</title>
    <link>https://community.splunk.com/t5/Splunk-Search/Index-Time-field-extraction/m-p/45383#M10764</link>
    <description>&lt;P&gt;The problems is I cannot see the fields in the manager. I am just learning and reading and I just want the fields to always be available for stats and charts.  Other than that, please show me a better way!&lt;/P&gt;

&lt;P&gt;Dave&lt;/P&gt;</description>
    <pubDate>Mon, 26 Nov 2012 21:39:31 GMT</pubDate>
    <dc:creator>daveowens</dc:creator>
    <dc:date>2012-11-26T21:39:31Z</dc:date>
    <item>
      <title>Index Time field extraction</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Index-Time-field-extraction/m-p/45380#M10761</link>
      <description>&lt;P&gt;I have a custom log file with entries like the one below, I want to pull 8 fields out at index time so I can graph and chart of them. &lt;/P&gt;

&lt;P&gt;wdSiteData.busy: false wdSiteData.needUpdate: false wdSiteData.requestType: -1 wdSiteData.state: UT wdSiteData.country: USA wdSiteData.district: SOME DISTRICT wdSiteData.availableUpdates: [SP_Update_4_2_1_107_from_96.jar, SP_Update_4_2_1_108.jar, SP_Update_4_2_1_95.jar, SP_Update_4_2_1_96.jar, SP_Update_4_3_0_77_from_4_2_1_108.jar, SP_Update_4_3_0_78.jar, SP_Update_4_3_0_84_from_78.jar, SP_Update_4_4_0_64_from_4_3_0_84.jar] wdSiteData.peerList: null wdSiteData.checksumJar: null wdSiteData.checksumInstall: null wdSiteData.partialDownloadBytes: 0 wdSiteData.filesize: 0 wdSiteData.siteVersion: 7.8.9.10 wdSiteData.versionFrom: null wdSiteData.versionTo: null wdSiteData.timestamp: null wdSiteData.downloadUrl: null wdSiteData.school: -1 wdSiteData.filename: null wdSiteData.updateAvailable: false wdSiteData.clientAddress: 10.10.10.10 wdSiteData.guid: {4445454b1e-805a-11de-8896-fdfdfdfd743c1a} wdSiteData.maximumPeerConnections: 0&lt;/P&gt;

&lt;P&gt;I have added in my transforms.conf /opt/splunk/etc/system/default/transforms.conf (regex and format are single lines)&lt;BR /&gt;
I have tested the regex and it does find the fields I want correctly&lt;/P&gt;

&lt;P&gt;[WSM-CONNTECTIONS-SiteData]&lt;BR /&gt;
REGEX  = wdSiteData.(state|country|district|siteVersion|timestamp|school|clientAddress|maximumPeerConnections):&lt;BR /&gt;
FORMAT = WSM-timestamp::"$5" district::"$3" school::"$6" state::"$1" country::"$2" version::"$4" ipaddress::"$7" peerconnections::"$8"&lt;BR /&gt;
WRITE_META = [true]&lt;/P&gt;

&lt;P&gt;I have added in my props.conf /opt/splunk/etc/system/default/props.conf&lt;BR /&gt;
[host::$IP_OF_HOST]&lt;BR /&gt;
TRANSFORMS-WSM = WSM-CONNTECTIONS-SiteData&lt;/P&gt;

&lt;P&gt;I have added in my fields.conf  /opt/splunk/etc/system/default/fields.conf&lt;/P&gt;

&lt;P&gt;[WSM-timestamp]&lt;BR /&gt;
INDEXED = True&lt;/P&gt;

&lt;P&gt;[district]&lt;BR /&gt;
INDEXED = True&lt;/P&gt;

&lt;P&gt;[school]&lt;BR /&gt;
INDEXED = True&lt;/P&gt;

&lt;P&gt;[state]&lt;BR /&gt;
INDEXED = True&lt;/P&gt;

&lt;P&gt;[country]&lt;BR /&gt;
INDEXED = True&lt;/P&gt;

&lt;P&gt;[version]&lt;BR /&gt;
INDEXED = True&lt;/P&gt;

&lt;P&gt;[ipaddress]&lt;BR /&gt;
INDEXED = True&lt;/P&gt;

&lt;P&gt;[peerconnections]&lt;BR /&gt;
INDEXED = True&lt;/P&gt;</description>
      <pubDate>Mon, 28 Sep 2020 12:52:03 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Index-Time-field-extraction/m-p/45380#M10761</guid>
      <dc:creator>daveowens</dc:creator>
      <dc:date>2020-09-28T12:52:03Z</dc:date>
    </item>
    <item>
      <title>Re: Index Time field extraction</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Index-Time-field-extraction/m-p/45381#M10762</link>
      <description>&lt;P&gt;Why use index-time field extraction? Is there a specific reason for doing so? Index-time field extraction should only be done if there's a really good reason for it, and only if you really know what you're doing. It has a negative impact on performance and often causes increased complexity.&lt;/P&gt;</description>
      <pubDate>Mon, 26 Nov 2012 21:12:21 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Index-Time-field-extraction/m-p/45381#M10762</guid>
      <dc:creator>Ayn</dc:creator>
      <dc:date>2012-11-26T21:12:21Z</dc:date>
    </item>
    <item>
      <title>Re: Index Time field extraction</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Index-Time-field-extraction/m-p/45382#M10763</link>
      <description>&lt;P&gt;By the way you don't actually say what the problem you're having is...?&lt;/P&gt;</description>
      <pubDate>Mon, 26 Nov 2012 21:13:27 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Index-Time-field-extraction/m-p/45382#M10763</guid>
      <dc:creator>Ayn</dc:creator>
      <dc:date>2012-11-26T21:13:27Z</dc:date>
    </item>
    <item>
      <title>Re: Index Time field extraction</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Index-Time-field-extraction/m-p/45383#M10764</link>
      <description>&lt;P&gt;The problems is I cannot see the fields in the manager. I am just learning and reading and I just want the fields to always be available for stats and charts.  Other than that, please show me a better way!&lt;/P&gt;

&lt;P&gt;Dave&lt;/P&gt;</description>
      <pubDate>Mon, 26 Nov 2012 21:39:31 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Index-Time-field-extraction/m-p/45383#M10764</guid>
      <dc:creator>daveowens</dc:creator>
      <dc:date>2012-11-26T21:39:31Z</dc:date>
    </item>
    <item>
      <title>Re: Index Time field extraction</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Index-Time-field-extraction/m-p/45384#M10765</link>
      <description>&lt;P&gt;Generally, always use search-time field extractions. The docs have plenty of information on this that should get you going. Here's a good place to start: &lt;A href="http://docs.splunk.com/Documentation/Splunk/latest/Knowledge/Addfieldsatsearchtime"&gt;http://docs.splunk.com/Documentation/Splunk/latest/Knowledge/Addfieldsatsearchtime&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 26 Nov 2012 21:43:59 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Index-Time-field-extraction/m-p/45384#M10765</guid>
      <dc:creator>Ayn</dc:creator>
      <dc:date>2012-11-26T21:43:59Z</dc:date>
    </item>
    <item>
      <title>Re: Index Time field extraction</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Index-Time-field-extraction/m-p/45385#M10766</link>
      <description>&lt;P&gt;As Ayn says, there's no need to make these fields part of your index, using search time extractions is the right way to go 99% of the time.&lt;/P&gt;

&lt;P&gt;Also, putting customisations in default/transforms.conf , default/props.conf and default/fields.conf is a bad idea, these files will get overwritten when you patch / upgrade&lt;/P&gt;

&lt;P&gt;You should make files in etc/system/local called props.conf and transforms.conf and put any customisations you've made in there. &lt;BR /&gt;
You should also remove the customisations you made to default/fields.conf - you don't need them for search time extraction.&lt;/P&gt;

&lt;P&gt;This is what you need to do search time extractions for all the fields in your Site Data events.&lt;/P&gt;

&lt;P&gt;props.conf:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;[host::$IP_OF_HOST]
REPORT-WSM = WSM_CONNTECTIONS_SiteData
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;transforms.conf&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;[WSM_CONNTECTIONS_SiteData]
REGEX = wdSiteData\.([^:]+):\s+(.*?)(?=(?:\s+wdSiteData|$))
FORMAT = $1::$2
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;in the search bar run :&lt;/P&gt;

&lt;P&gt;&lt;CODE&gt;| extract reload=t&lt;/CODE&gt;&lt;/P&gt;

&lt;P&gt;then &lt;/P&gt;

&lt;P&gt;&lt;CODE&gt;wdSiteData&lt;/CODE&gt;&lt;/P&gt;

&lt;P&gt;You should see a bunch of interesting fields in the side bar&lt;/P&gt;</description>
      <pubDate>Mon, 26 Nov 2012 23:15:52 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Index-Time-field-extraction/m-p/45385#M10766</guid>
      <dc:creator>jonuwz</dc:creator>
      <dc:date>2012-11-26T23:15:52Z</dc:date>
    </item>
    <item>
      <title>Re: Index Time field extraction</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Index-Time-field-extraction/m-p/45386#M10767</link>
      <description>&lt;P&gt;and if you're running 4.3+ you don't even need to do an extract reload=t, search time extractions should be reloaded each time Splunkd forks off a new process for a search.&lt;/P&gt;</description>
      <pubDate>Tue, 27 Nov 2012 00:25:40 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Index-Time-field-extraction/m-p/45386#M10767</guid>
      <dc:creator>Drainy</dc:creator>
      <dc:date>2012-11-27T00:25:40Z</dc:date>
    </item>
    <item>
      <title>Re: Index Time field extraction</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Index-Time-field-extraction/m-p/45387#M10768</link>
      <description>&lt;P&gt;I have a close problem: I have to extract fields at index time to accelerate my searches (I have millions of events with 72 fields in each one) and a people from Splunk suggested to me to extract fields at index time to have a quicker search.&lt;BR /&gt;
When you say " ...a negative impact on performance..." you are speaking about indexing performance or searching performance?&lt;BR /&gt;
thank you.&lt;BR /&gt;
Giuseppe&lt;/P&gt;</description>
      <pubDate>Thu, 19 Nov 2015 11:01:11 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Index-Time-field-extraction/m-p/45387#M10768</guid>
      <dc:creator>gcusello</dc:creator>
      <dc:date>2015-11-19T11:01:11Z</dc:date>
    </item>
  </channel>
</rss>

