Getting Data In

How to apply ingest time log to metric?

Path Finder

Hi All,

Let's say I receive log data through TCP on UF, and I want to save the data in event index and metric index as well.
I create new source type and new metric index in order to save the data into metric.

  1. Is it possible to save the data in the event index(normal) and metric index at the same time?

2. With below configuration, the data is only saving on IDX. If I want to save the data into metric as well, how to do it?

on UF:
index = event_idx
sourcetype = eventsourcetype

on IDX

0 Karma
Get Updates on the Splunk Community!

Improve Your Security Posture

Watch NowImprove Your Security PostureCustomers are at the center of everything we do at Splunk and security ...

Maximize the Value from Microsoft Defender with Splunk

 Watch NowJoin Splunk and Sens Consulting for this Security Edition Tech TalkWho should attend:  Security ...

This Week's Community Digest - Splunk Community Happenings [6.27.22]

Get the latest news and updates from the Splunk Community here! News From Splunk Answers ✍️ Splunk Answers is ...