Getting Data In

How can I parse events in transforms.conf and props.conf?

jenniferleenyc
Engager

I'm writing transforms.conf and props.conf in /splunk/home/etc/system/local to parse events before a certain string(CERTIFICATE [^0]) and on newlines. This is what I have in props.conf so far:

###props.conf###
###<spec>:sourcetype::qualys###
[sourcetype::qualys]
LINE_BREAKER=?:\([^0]\)CERTIFICATE\s+[^0]|([\n]+)
SHOULD_LINEMERGER=false

Do I need to write anything in transforms.conf? And how can I test my code?

Tags (1)
0 Karma

masonmorales
Influencer

You do not need transforms.conf unless you are doing things like scrubbing sensitive data, event-level filtering, field extractions (which you can also add later or just do in props.conf).

You can test by installing Splunk on your laptop, putting the same props.conf on it, and then using the "add data" menu in Splunk web to upload a data sample. Or, if you want to test in a live environment, just make a small test index and send the data there in your inputs.conf. Change it back to the "live" index when you are ready.

Also, you may want to add some other settings for timestamp extraction, time zone, etc. Take a look at this video from .conf 2015 for some best practices: http://conf.splunk.com/session/2015/recordings/2015-splunk-11.mp4
Slides: http://conf.splunk.com/session/2015/conf2015_Aduca_Splunk_Delpoying_OnboardingDataIntoSplunk.pdf

0 Karma

jenniferleenyc
Engager

Some of my events displayed in Splunk contain several events, which is why I'm trying to filter them in props.conf using LINE_BREAKER. Would that count as "event-level filtering"? Would that require a transforms.conf?

0 Karma

jenniferleenyc
Engager

Is there a specific way to "put the same props.conf" on the Splunk platform? Or can I keep it in /splunk/home/etc/system/local?

0 Karma
Get Updates on the Splunk Community!

Aligning Observability Costs with Business Value: Practical Strategies

 Join us for an engaging Tech Talk on Aligning Observability Costs with Business Value: Practical ...

Mastering Data Pipelines: Unlocking Value with Splunk

 In today's AI-driven world, organizations must balance the challenges of managing the explosion of data with ...

Splunk Up Your Game: Why It's Time to Embrace Python 3.9+ and OpenSSL 3.0

Did you know that for Splunk Enterprise 9.4, Python 3.9 is the default interpreter? This shift is not just a ...