Getting Data In

How can we make sure the appropriate key-value pairs from different web application logs are indexed in Splunk?

akhilchhugani
New Member

We have multiple web applications that have different information being recorded to make sure the appropriate information is taken from each log. Do we have to assign each type of log a different indexer in inputs.conf while creating new indexers to get exactly what we need from each log?

0 Karma
1 Solution

richgalloway
SplunkTrust
SplunkTrust

Don't confuse indexes and indexers. An index is a repository for your data. Indexers are Splunk instances that accept events/logs and store them in indexes.

You do not need separate indexes for each log type. You should, however, specify a sourcetype for each type of log. Sourcetypes tell Splunk how to process the event, such as what the timestamps look like, how the event should be parsed, etc.

---
If this reply helps you, Karma would be appreciated.

View solution in original post

richgalloway
SplunkTrust
SplunkTrust

Don't confuse indexes and indexers. An index is a repository for your data. Indexers are Splunk instances that accept events/logs and store them in indexes.

You do not need separate indexes for each log type. You should, however, specify a sourcetype for each type of log. Sourcetypes tell Splunk how to process the event, such as what the timestamps look like, how the event should be parsed, etc.

---
If this reply helps you, Karma would be appreciated.

akhilchhugani
New Member

Where can you tell splunk how to process the information based on the sourcetype this was my initial thought, but I was unsure as to how this would occur.

0 Karma

richgalloway
SplunkTrust
SplunkTrust

Sourcetypes are defined in the props.conf file. You can also define new sourcetypes while using the Field Extractor.

---
If this reply helps you, Karma would be appreciated.
0 Karma

akhilchhugani
New Member

So if I wanted to create custom sourcetypes, I could add them to the props.conf and edit the inputs.conf and then use the field extractor to edit what key-value pairs they should take from each of these sourcetypes?

0 Karma

richgalloway
SplunkTrust
SplunkTrust

Correct. Be sure to modify the config files in the local directory, not default.

---
If this reply helps you, Karma would be appreciated.
0 Karma

akhilchhugani
New Member

I had one more additional question regarding this, when I use the field extractor, will this have to be done every time another log is recorded or only when I set it up for that source type.

0 Karma

richgalloway
SplunkTrust
SplunkTrust

Once per sourcetype.

---
If this reply helps you, Karma would be appreciated.
0 Karma
Get Updates on the Splunk Community!

Welcome to the Splunk Community!

(view in My Videos) We're so glad you're here! The Splunk Community is place to connect, learn, give back, and ...

Tech Talk | Elevating Digital Service Excellence: The Synergy of Splunk RUM & APM

Elevating Digital Service Excellence: The Synergy of Real User Monitoring and Application Performance ...

Adoption of RUM and APM at Splunk

    Unleash the power of Splunk Observability   Watch Now In this can't miss Tech Talk! The Splunk Growth ...