Splunk Search

We have tried to extract index time field extarction

rvinil
New Member

We have tried to extract index time field extraction, below are the details..
props.conf:-

[sourcetype]
TRANSFORMS-fieldname = fieldname

Transforms.conf:-

[fieldname]
REGEX = regexquery
FORMAT = fieldname::"$1"
SOURCE_KEY = fieldname

fields.conf:-

[fieldname]
INDEXED = true

Thanks in advance

Tags (1)
0 Karma
1 Solution

micahkemp
Champion

You also need WRITE_META = true in your transform.

Also make sure your regex has a capturing group. Your format line says to use the first capture group as the field value.

View solution in original post

0 Karma

nkchaitanya
Explorer

try as

Transforms.conf
[fieldname]
REGEX =regex
FORMAT = fieldname::"$1"
SOURCE_KEY = fieldname
WRITE_META = true

in Props.conf
[sourcetype]
REPORT-fieldname = fieldname
NO_BINARY_CHECK = true
category = Custom
disabled = false
pulldown_type = true

0 Karma

micahkemp
Champion

You also need WRITE_META = true in your transform.

Also make sure your regex has a capturing group. Your format line says to use the first capture group as the field value.

0 Karma

rvinil
New Member

Hi Micahkemp,

Used the write_meta = true. Its working in my PC, when i used the same ".conf's" in office not able to get the data. Please suggest...

0 Karma

micahkemp
Champion

Which instance did you install this configuration on? It needs to go on the heavy forwarders and indexers.

0 Karma
Get Updates on the Splunk Community!

Stay Connected: Your Guide to May Tech Talks, Office Hours, and Webinars!

Take a look below to explore our upcoming Community Office Hours, Tech Talks, and Webinars this month. This ...

They're back! Join the SplunkTrust and MVP at .conf24

With our highly anticipated annual conference, .conf, comes the fez-wearers you can trust! The SplunkTrust, as ...

Enterprise Security Content Update (ESCU) | New Releases

Last month, the Splunk Threat Research Team had two releases of new security content via the Enterprise ...