<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic How to resolve Splunk from missing some automatically recognized source types? in Splunk Search</title>
    <link>https://community.splunk.com/t5/Splunk-Search/How-to-resolve-Splunk-from-missing-some-automatically-recognized/m-p/298809#M90070</link>
    <description>&lt;P&gt;I have transforms like access-extractions and access-request, which map to the automatically recognized source types like  access_combined, access_combined_wcookie, and access_common in the Field Extractions.  Fields from events with these sourcetypes have fields extracted at search time as they should.  However, the automatically recognized source types list also mentions: websphere_trlog_syserr and websphere_trlog_sysout.  I have a websphere_trlog but not the other two.  These should be built-in and not require any other specific app, right?  Why would I be missing these two?&lt;/P&gt;

&lt;P&gt;Ref: &lt;A href="http://docs.splunk.com/Documentation/Splunk/6.4.3/Data/Listofpretrainedsourcetypes" target="_blank"&gt;http://docs.splunk.com/Documentation/Splunk/6.4.3/Data/Listofpretrainedsourcetypes&lt;/A&gt;&lt;/P&gt;

&lt;P&gt;Splunk version 6.4.3&lt;/P&gt;</description>
    <pubDate>Tue, 29 Sep 2020 14:46:46 GMT</pubDate>
    <dc:creator>quantumburnz</dc:creator>
    <dc:date>2020-09-29T14:46:46Z</dc:date>
    <item>
      <title>How to resolve Splunk from missing some automatically recognized source types?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-resolve-Splunk-from-missing-some-automatically-recognized/m-p/298809#M90070</link>
      <description>&lt;P&gt;I have transforms like access-extractions and access-request, which map to the automatically recognized source types like  access_combined, access_combined_wcookie, and access_common in the Field Extractions.  Fields from events with these sourcetypes have fields extracted at search time as they should.  However, the automatically recognized source types list also mentions: websphere_trlog_syserr and websphere_trlog_sysout.  I have a websphere_trlog but not the other two.  These should be built-in and not require any other specific app, right?  Why would I be missing these two?&lt;/P&gt;

&lt;P&gt;Ref: &lt;A href="http://docs.splunk.com/Documentation/Splunk/6.4.3/Data/Listofpretrainedsourcetypes" target="_blank"&gt;http://docs.splunk.com/Documentation/Splunk/6.4.3/Data/Listofpretrainedsourcetypes&lt;/A&gt;&lt;/P&gt;

&lt;P&gt;Splunk version 6.4.3&lt;/P&gt;</description>
      <pubDate>Tue, 29 Sep 2020 14:46:46 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-resolve-Splunk-from-missing-some-automatically-recognized/m-p/298809#M90070</guid>
      <dc:creator>quantumburnz</dc:creator>
      <dc:date>2020-09-29T14:46:46Z</dc:date>
    </item>
    <item>
      <title>Re: How to resolve Splunk from missing some automatically recognized source types?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-resolve-Splunk-from-missing-some-automatically-recognized/m-p/298810#M90071</link>
      <description>&lt;P&gt;You should never, Never, NEVER rely on Splunk's automatic sourcetyping feature (IMHO this should be deprecated and removed).  You, as the admin, should ALWAYS manually sourcetype everything that you forward into splunk and you should consult and conform to this document:&lt;/P&gt;

&lt;P&gt;&lt;A href="http://docs.splunk.com/Documentation/Splunk/6.6.2/Data/Listofpretrainedsourcetypes"&gt;http://docs.splunk.com/Documentation/Splunk/6.6.2/Data/Listofpretrainedsourcetypes&lt;/A&gt;&lt;BR /&gt;
YOU should be the one to do this mapping with a &lt;CODE&gt;sourcetype=&amp;lt;foo&amp;gt;&lt;/CODE&gt; inside of EVERY stanza in EVERY &lt;CODE&gt;inputs.conf&lt;/CODE&gt;.&lt;/P&gt;</description>
      <pubDate>Fri, 07 Jul 2017 21:40:20 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-resolve-Splunk-from-missing-some-automatically-recognized/m-p/298810#M90071</guid>
      <dc:creator>woodcock</dc:creator>
      <dc:date>2017-07-07T21:40:20Z</dc:date>
    </item>
    <item>
      <title>Re: How to resolve Splunk from missing some automatically recognized source types?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-resolve-Splunk-from-missing-some-automatically-recognized/m-p/298811#M90072</link>
      <description>&lt;P&gt;Thanks woodcock - that's some pretty strong wording. &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;

&lt;P&gt;The sourcetypes don't currently conform to the document so they'll need to be renamed.  Regardless, once this is done, I still want Splunk to properly extract fields at search time but there's no definition for these sourcetypes in props.conf.&lt;/P&gt;

&lt;P&gt;What would cause this?  The extractions should be available by default, correct?  Hence "pretrained sourcetypes."&lt;/P&gt;</description>
      <pubDate>Fri, 07 Jul 2017 23:33:56 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-resolve-Splunk-from-missing-some-automatically-recognized/m-p/298811#M90072</guid>
      <dc:creator>quantumburnz</dc:creator>
      <dc:date>2017-07-07T23:33:56Z</dc:date>
    </item>
    <item>
      <title>Re: How to resolve Splunk from missing some automatically recognized source types?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-resolve-Splunk-from-missing-some-automatically-recognized/m-p/298812#M90073</link>
      <description>&lt;P&gt;This product is not a magic 8-ball or genie in a bottle; it can't know everything.  Check splunkbase for an app related to your source/sourcetype; if you are using enterprise software, it is probably there.  If not, you will have to build your own field extractions or force the product to output it's stuff in something Splunk automatically groks like &lt;CODE&gt;JSON&lt;/CODE&gt;, &lt;CODE&gt;CEP&lt;/CODE&gt;, &lt;CODE&gt;CSV&lt;/CODE&gt;, or &lt;CODE&gt;KVPs&lt;/CODE&gt;.&lt;/P&gt;</description>
      <pubDate>Sat, 08 Jul 2017 14:29:47 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-resolve-Splunk-from-missing-some-automatically-recognized/m-p/298812#M90073</guid>
      <dc:creator>woodcock</dc:creator>
      <dc:date>2017-07-08T14:29:47Z</dc:date>
    </item>
    <item>
      <title>Re: How to resolve Splunk from missing some automatically recognized source types?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-resolve-Splunk-from-missing-some-automatically-recognized/m-p/298813#M90074</link>
      <description>&lt;P&gt;Agree - there's no such thing as a "silver bullet."  However, I guess my question comes down to: Is there a built-in extraction for all of the pretrained sourcetypes?  I assumed there was; otherwise, what's the point of the "pretrained?"&lt;/P&gt;</description>
      <pubDate>Sat, 08 Jul 2017 15:21:27 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-resolve-Splunk-from-missing-some-automatically-recognized/m-p/298813#M90074</guid>
      <dc:creator>quantumburnz</dc:creator>
      <dc:date>2017-07-08T15:21:27Z</dc:date>
    </item>
    <item>
      <title>Re: How to resolve Splunk from missing some automatically recognized source types?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-resolve-Splunk-from-missing-some-automatically-recognized/m-p/298814#M90075</link>
      <description>&lt;P&gt;I suppose that is a good point.  Start with the &lt;CODE&gt;CIM&lt;/CODE&gt; app:&lt;BR /&gt;
&lt;A href="https://splunkbase.splunk.com/app/1621/"&gt;https://splunkbase.splunk.com/app/1621/&lt;/A&gt;&lt;BR /&gt;
It changes frequently.  Build out from there.&lt;/P&gt;</description>
      <pubDate>Sat, 08 Jul 2017 15:29:22 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-resolve-Splunk-from-missing-some-automatically-recognized/m-p/298814#M90075</guid>
      <dc:creator>woodcock</dc:creator>
      <dc:date>2017-07-08T15:29:22Z</dc:date>
    </item>
  </channel>
</rss>

