Getting Data In

Change index depending on host

pbalbasdtt
Path Finder

Hi all,

I'm trying to split Windows events into different indexes at index time depending on the host which is sending them. Below there are my props.conf and transforms.conf

  • props.conf:
    [WMI:WinEventLog:Security]
    TRANSFORMS-set_new_index = set_index_new

  • transforms.conf
    [set_index_new]
    REGEX = MY.HOSTNAME.12.COM
    FORMAT = windows-new
    DEST_KEY = _MetaData:Index

I tried with different combinations on the regex but none of them worked. Can someone tell me what could be wrong? Thanks in advance.

Best.

0 Karma
1 Solution

DalJeanis
Legend

1) Your transforms does not say which field you are trying to match (SOURCE_KEY). If you don't tell it that, then it probably is checking the entire _raw, iirc.

2) If you mean to match only the character ., then your regex should escape the character using \.

View solution in original post

0 Karma

DalJeanis
Legend

1) Your transforms does not say which field you are trying to match (SOURCE_KEY). If you don't tell it that, then it probably is checking the entire _raw, iirc.

2) If you mean to match only the character ., then your regex should escape the character using \.

0 Karma

pbalbasdtt
Path Finder

The 2nd one works!!! Thanks a lot for your answer

0 Karma

harsmarvania57
Ultra Champion

Hi,

On which splunk instance, have you configured above props.conf and transforms.conf ? It should be on first Splunk Enterprise instance from Universal Forwarder. For example: If UF sends data to Heavy Forwarder and then it goes to Indexer then you need to configure props & transforms on Heavy Forwarder. If UF sends data directly to Indexer then you need to configure props & transforms on Indexer.

pbalbasdtt
Path Finder

Hi,

Thanks for your response. I have a UF sending logs to indexers. I deployed those .conf files on indexers but it's not indexing logs on the new index, and it is using the old one.

0 Karma

harsmarvania57
Ultra Champion

Have you restarted splunk on Indexer after adding those props/transforms ?

0 Karma

pbalbasdtt
Path Finder

I deployed the changes via Cluster Master, so I assume no restart on IDX is required, is that right?

0 Karma

harsmarvania57
Ultra Champion

Yes if you deployed from CM then it will automatically take care. Additionally only new data will go into new index not existing data. If that is still not working then I'll suggest to provide some sample data (Mask sensitive data)

Got questions? Get answers!

Join the Splunk Community Slack to learn, troubleshoot, and make connections with fellow Splunk practitioners in real time!

Meet up IRL or virtually!

Join Splunk User Groups to connect and learn in-person by region or remotely by topic or industry.

Get Updates on the Splunk Community!

Index This | What travels the world but is also stuck in place?

April 2026 Edition  Hayyy Splunk Education Enthusiasts and the Eternally Curious!   We’re back with this ...

Discover New Use Cases: Unlock Greater Value from Your Existing Splunk Data

Realizing the full potential of your Splunk investment requires more than just understanding current usage; it ...

Continue Your Journey: Join Session 2 of the Data Management and Federation Bootcamp ...

As data volumes continue to grow and environments become more distributed, managing and optimizing data ...