I'm trying to split Windows events into different indexes at index time depending on the host which is sending them. Below there are my props.conf and transforms.conf
TRANSFORMS-setnewindex = setindexnew
REGEX = MY.HOSTNAME.12.COM
FORMAT = windows-new
DEST_KEY = _MetaData:Index
I tried with different combinations on the regex but none of them worked. Can someone tell me what could be wrong? Thanks in advance.
On which splunk instance, have you configured above props.conf and transforms.conf ? It should be on first Splunk Enterprise instance from Universal Forwarder. For example: If UF sends data to Heavy Forwarder and then it goes to Indexer then you need to configure props & transforms on Heavy Forwarder. If UF sends data directly to Indexer then you need to configure props & transforms on Indexer.
Thanks for your response. I have a UF sending logs to indexers. I deployed those .conf files on indexers but it's not indexing logs on the new index, and it is using the old one.
Yes if you deployed from CM then it will automatically take care. Additionally only new data will go into new index not existing data. If that is still not working then I'll suggest to provide some sample data (Mask sensitive data)
1) Your transforms does not say which field you are trying to match (SOURCE_KEY). If you don't tell it that, then it probably is checking the entire _raw, iirc.
2) If you mean to match only the character
., then your regex should escape the character using