Getting Data In

Do not see "access_combined" sourcetype

lbraginsky
New Member

Hello,

I'm a relative newbie. In a very helpful SPLUNK video on youtube, I saw as the nice lady showed how easy it is to search various HTTP fields (such as "status", "method", etc). With one catch though: I must set the sourcetype=access_combined. So my problem is I DO NOT SEE ANY events in my SPLUNK logs with this sourcetype, even though I do have some HTTP logs.

Any idea why?

Thanks,

  • leo b
Tags (1)
0 Karma

lbraginsky
New Member

Thanks to those who replied. I've basically made Splunk understand the format by using Field Extractions for the fields I'm interested in, and I'll keep using this technique if I need other fields.

0 Karma

zeroactive
Path Finder

According to: http://docs.splunk.com/Documentation/Splunk/5.0.4/Data/Listofpretrainedsourcetypes your log file will need to be in NCSA format.

If you can see the HTTP log results in Splunk at all, look at the "source_type" field and see if Splunk matched it against one of the predefined types listed in the document linked to above. If "source_type" is not a field included as a part of each event in the search results, then use the list of fields on the left to "Select and show in results" to add that field to the results. You can also see all of the values that the "source_type" contains from the field list on the left as well.

0 Karma
Get Updates on the Splunk Community!

Splunk Search APIを使えば調査過程が残せます

   このゲストブログは、JCOM株式会社の情報セキュリティ本部・専任部長である渡辺慎太郎氏によって執筆されました。 Note: This article is published in both Japanese ...

Integrating Splunk Search API and Quarto to Create Reproducible Investigation ...

 Splunk is More Than Just the Web Console For Digital Forensics and Incident Response (DFIR) practitioners, ...

Congratulations to the 2025-2026 SplunkTrust!

Hello, Splunk Community! We are beyond thrilled to announce our newest group of SplunkTrust members!  The ...