Getting Data In

Field extraction from Windows eventlog

gltplus
New Member

Windows eventlog are indexed fine.
A particulare evnetlog source "WinEventLog:Application Info" (mind the space) contains the normale message field.

Inside this message field I want to extra a hostname.

sourcetype="WinEventLog:Application Info" | rex field=Message "regex query"(?....) more regex" works all fine. Hostname are captured.

Now I really need this to be done from the props.conf.

I created in the props.conf

["WinEventLog:Application Info"]
EXTRACT-Hostname = same regex as above

But this doesn't seem to work? I'm I missing something?
Something wrong with the sourcetype name (mind the space)?

Tags (1)
0 Karma

493669
Super Champion

it seems that you have added double quotes for source so try without quotes like below:

[WinEventLog:Application Info]
EXTRACT-Hostname = <your regex>
0 Karma
Career Survey
First 500 qualified respondents will receive a $20 gift card! Tell us about your professional Splunk journey.
Get Updates on the Splunk Community!

Observe and Secure All Apps with Splunk

 Join Us for Our Next Tech Talk: Observe and Secure All Apps with SplunkAs organizations continue to innovate ...

What's New in Splunk Observability - August 2025

What's New We are excited to announce the latest enhancements to Splunk Observability Cloud as well as what is ...

Introduction to Splunk AI

How are you using AI in Splunk? Whether you see AI as a threat or opportunity, AI is here to stay. Lucky for ...