I have created what I believe to be a custom sourcetype for Apache TomCat logs (which are customised). But when I add an input for a single file and try it (Via Splunk Web), I see no entires in my new index that i'm trying to index it to..
My props.conf:
[Apache-TomCat]
pulldown_type = true
MAX_TIMESTAMP_LOOKAHEAD = 32
SHOULD_LINEMERGE = False
REPORT-Apache-TomCat = Apache-TomCat
TRANSFORMS-comment = comment
My transforms.conf:
[comment]
REGEX = \#.*
DEST_KEY = queue
FORMAT = nullQueue
[Apache-TomCat]
FIELDS="date", "time", "c-ip", "x-H(remoteUser)", "cs-method", "cs-uri", "sc-status", "time-taken", "x-H(requestedSessionId)", "x-P(inFrame)", "x-P(eventSource)", "x-P(eventParam)", "x-P(eventShift)", "x-P(rcounter)", "x-P(scrollPositions)", "x-P(objFocusId)", "x-P(__navigator_index)", "x-R(username)", "x-S(int_user_id)
DELIMS = " "
I looked to see if the log had been indexed, by going to the splunk web, clicking manage, then indexes and looking at the count of events for my index which is 0! 😞
Are there any error logs which might help tell me what the problem is?
I did a data input from Manage > Data Inputs, rather than Home > Add Data and it's working. I think it might have been the host regex I had.
The file is called: NTPA1111_filename.txt
I have the host regex as: [NTPA][0-9]*
So I expect the Host to be NTPA1111
If the Host Regex fails, does anyone know what happenes? where the error is logged?
I've done a search for index=test
which returns 16667 events, but there should be 21k+ events 😞 Why has this happened?
My index, which the file is being processed into is called test.