Getting Data In

Index Field Transform not Catching Every Event

aaron_gibby
Engager

I'm running a simple transform to change the index from "tenable" to "tenable-dc" for one of my sourcetypes.

Props.conf

[tenable:sc:vuln]
TRANSFORMS-~dcfilter = dcfilter

Transforms.conf

[dcfilter]
REGEX = ([Dd][Cc]01)
FORMAT = $0-dc
DEST_KEY = _MetaData:Index

 

The problem that I'm having is that the transform is not catching every event. I have 164 events that the filter should catch, but only 156 events are indexed in the new index (tenable-dc).

If I run the following search command, it catches all 164 events:

index=tenable* sourcetype=tenable:sc:vuln | regex _raw = "([Dd][Cc]01)"

 

I can't find any similarities between the 8 "missed" events or differences between those events and the 156 "captured" events. My first thought was that the regex was wrong, but the search-time regex works.  Does anyone have any experience with index-time extractions missing events?

Labels (1)
0 Karma
Got questions? Get answers!

Join the Splunk Community Slack to learn, troubleshoot, and make connections with fellow Splunk practitioners in real time!

Meet up IRL or virtually!

Join Splunk User Groups to connect and learn in-person by region or remotely by topic or industry.

Get Updates on the Splunk Community!

Modernize your Splunk Apps – Introducing Python 3.13 in Splunk

We are excited to announce that the upcoming releases of Splunk Enterprise 10.2.x and Splunk Cloud Platform ...

Step into “Hunt the Insider: An Splunk ES Premier Mystery” to catch a cybercriminal ...

After a whole week of being on call, you fell asleep on your keyboard, and you hit a sequence of buttons that ...

SplunkTrust Application Period is Officially OPEN!

It's that time, folks! The application/nomination period for the 2026-2027 SplunkTrust is officially open. If ...