<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Setting field values whenever adding events to splunk. in Splunk Search</title>
    <link>https://community.splunk.com/t5/Splunk-Search/Setting-field-values-whenever-adding-events-to-splunk/m-p/100875#M26049</link>
    <description>&lt;P&gt;Yes, the name of the indexer would be its hostname.  Because the splunk_server field is set when the data is indexed, I'm not sure that you can override it.&lt;/P&gt;</description>
    <pubDate>Tue, 27 Mar 2012 17:49:34 GMT</pubDate>
    <dc:creator>sowings</dc:creator>
    <dc:date>2012-03-27T17:49:34Z</dc:date>
    <item>
      <title>Setting field values whenever adding events to splunk.</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Setting-field-values-whenever-adding-events-to-splunk/m-p/100871#M26045</link>
      <description>&lt;P&gt;Since fields in Splunk are generally not set at index-time, except for a few key values like source, sourcetype, _raw and index.&lt;BR /&gt;
Lets say i extracted other fields at search time and set the values for the fields and then send back to Splunk. I realised that i cannot set the values for linecount, index , splunk_server etc while i can set the other fields when i want to add events to Splunk server. That means the values for linecount, index, splunk_server fields values cannot be set although i retrieve those fields at search time. Is that true?&lt;/P&gt;</description>
      <pubDate>Mon, 28 Sep 2020 11:34:34 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Setting-field-values-whenever-adding-events-to-splunk/m-p/100871#M26045</guid>
      <dc:creator>misteryuku</dc:creator>
      <dc:date>2020-09-28T11:34:34Z</dc:date>
    </item>
    <item>
      <title>Re: Setting field values whenever adding events to splunk.</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Setting-field-values-whenever-adding-events-to-splunk/m-p/100872#M26046</link>
      <description>&lt;P&gt;How you retrieve the events originally has nothing to do with what Splunk does with incoming data. The values of the fields you mention can be overridden by search-time field extractions, but it sounds like a bad idea to touch them.&lt;/P&gt;</description>
      <pubDate>Mon, 26 Mar 2012 08:50:31 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Setting-field-values-whenever-adding-events-to-splunk/m-p/100872#M26046</guid>
      <dc:creator>Ayn</dc:creator>
      <dc:date>2012-03-26T08:50:31Z</dc:date>
    </item>
    <item>
      <title>Re: Setting field values whenever adding events to splunk.</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Setting-field-values-whenever-adding-events-to-splunk/m-p/100873#M26047</link>
      <description>&lt;P&gt;In my experience, the "splunk_server" field contains the name of the indexer, though it could be the name of the search head--I don't currently have a distributed search environment in which to test.&lt;/P&gt;</description>
      <pubDate>Mon, 26 Mar 2012 14:52:51 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Setting-field-values-whenever-adding-events-to-splunk/m-p/100873#M26047</guid>
      <dc:creator>sowings</dc:creator>
      <dc:date>2012-03-26T14:52:51Z</dc:date>
    </item>
    <item>
      <title>Re: Setting field values whenever adding events to splunk.</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Setting-field-values-whenever-adding-events-to-splunk/m-p/100874#M26048</link>
      <description>&lt;P&gt;Hello sowings, what you mean by the name of the indexer? Is it the name of the indexer that indexes the data? How to format the log message to set the splunk_server field? Is it by key=value pairs??&lt;/P&gt;</description>
      <pubDate>Tue, 27 Mar 2012 04:55:45 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Setting-field-values-whenever-adding-events-to-splunk/m-p/100874#M26048</guid>
      <dc:creator>misteryuku</dc:creator>
      <dc:date>2012-03-27T04:55:45Z</dc:date>
    </item>
    <item>
      <title>Re: Setting field values whenever adding events to splunk.</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Setting-field-values-whenever-adding-events-to-splunk/m-p/100875#M26049</link>
      <description>&lt;P&gt;Yes, the name of the indexer would be its hostname.  Because the splunk_server field is set when the data is indexed, I'm not sure that you can override it.&lt;/P&gt;</description>
      <pubDate>Tue, 27 Mar 2012 17:49:34 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Setting-field-values-whenever-adding-events-to-splunk/m-p/100875#M26049</guid>
      <dc:creator>sowings</dc:creator>
      <dc:date>2012-03-27T17:49:34Z</dc:date>
    </item>
  </channel>
</rss>

