Getting Data In

How to setup "Metadata" characteristics in Splunk DB connect V2, for the query results received from Microsoft SQL Server 2012?

rupesh_patil20
Path Finder

Hello,

Finally I have configure my Remote sql server database with splunk using Splunk DB connect V2, but.. in my setup of last step I really don't know what to write(fill in those fields >> http://screencast.com/t/RNqNKkvn ). For your information I have taken the screenshot which will help you to guide me.

http://screencast.com/t/0xxdLo8W > Done Name Input successfully
http://screencast.com/t/sIOhgIVFr > Choose and Preview Table successfully
http://screencast.com/t/OtezGx3nI1 > Set Parameter successfully
http://screencast.com/t/RNqNKkvn > What should I enter here in source and sourcetype?**

From SQL Server I am retrieving the data, which i want to put in the index named "dev_zipcode". This data I needed for my application.
Thanks !!
Awaited for your quick response.

0 Karma
1 Solution

laserval
Communicator

You set them to values that make it easy for you to understand where the data came from (source), and what format it is (sourcetype). So for example, I have a DB input set up where I set source to the name of the database and table, securitylogs_AccountUpdates, and I set the sourcetype to securitylogs. I then used the sourcetype to describe how to parse the timestamp in props.conf. That way, if I set up more inputs from other tables in the same database, I can use the same sourcetype so I get all that parsing done the same way.

You might not need any special parsing, so just make sure the values you put in Source and Sourcetype make sense for the future.

Here's some more info on the two concepts:

View solution in original post

0 Karma

laserval
Communicator

You set them to values that make it easy for you to understand where the data came from (source), and what format it is (sourcetype). So for example, I have a DB input set up where I set source to the name of the database and table, securitylogs_AccountUpdates, and I set the sourcetype to securitylogs. I then used the sourcetype to describe how to parse the timestamp in props.conf. That way, if I set up more inputs from other tables in the same database, I can use the same sourcetype so I get all that parsing done the same way.

You might not need any special parsing, so just make sure the values you put in Source and Sourcetype make sense for the future.

Here's some more info on the two concepts:

0 Karma

rupesh_patil20
Path Finder

Thanks Laserval.
I will do the needful as you suggested.

0 Karma

rupesh_patil20
Path Finder

Hello Friends, Please help me to solve this issue..

0 Karma
Got questions? Get answers!

Join the Splunk Community Slack to learn, troubleshoot, and make connections with fellow Splunk practitioners in real time!

Meet up IRL or virtually!

Join Splunk User Groups to connect and learn in-person by region or remotely by topic or industry.

Get Updates on the Splunk Community!

May 2026 Splunk Expert Sessions: Security & Observability

Level Up Your Operations: May 2026 Splunk Expert Sessions Whether you are refining your security posture or ...

Network to App: Observability Unlocked [May & June Series]

In today’s digital landscape, your environment is no longer confined to the data center. It spans complex ...

SPL2 Deep Dives, AppDynamics Integrations, SAML Made Simple and Much More on Splunk ...

Splunk Lantern is Splunk’s customer success center that provides practical guidance from Splunk experts on key ...