Getting Data In

New SourceType and pushing out

willadams
Contributor

I have a requirement to duplicate a default SPLUNK sourcetype. The duplicate sourcetype is based on the JSON sourcetype. Effectively my new sourcetype is configured as follows

[json:myapp]
INDEXED_EXTRACTIONS = JSON
TIMESTAMP_FIELDS = date
TIME_FORMAT = %Y%m%d
TZ = ****** [redacted]
detect_trailing_nulls = auto
SHOULD_LINEMERGE = false
KV_MODE = none
AUTO_KV_JSON = false 

My question is around deploying this to my distributed environment. The above configuration on a standalone instance would be to create a local props.conf under etc/system/local with this inserted. However in a distributed environment (with Cluster Masters, Index Cluster, search heads etc.) should this be deployed as a typical app or must I manually adjust each instance in my environment to pick this up. It is not being handled differently to standard JSON so hence using the same transforms that JSON would use hence the INDEXED_TRANSACTIONS are no different. The only item being added in this line is the Time Zone. I am not changing the whole JSON as this one particular device I need to handle differently to everything else, hence the need. The question is more around the default duplication of existing sourcetypes.

0 Karma

richgalloway
SplunkTrust
SplunkTrust

Add your custom sourcetype to a custom app then deploy the app to all instances via the Deployment Server, Cluster Master, and SHC Deployer. Deployment to all instances perhaps is more than is necessary, but doesn't hurt and means the props are available wherever they are needed.

---
If this reply helps you, Karma would be appreciated.
0 Karma
Got questions? Get answers!

Join the Splunk Community Slack to learn, troubleshoot, and make connections with fellow Splunk practitioners in real time!

Meet up IRL or virtually!

Join Splunk User Groups to connect and learn in-person by region or remotely by topic or industry.

Get Updates on the Splunk Community!

Automating Threat Operations and Threat Hunting with Recorded Future

    Automating Threat Operations and Threat Hunting with Recorded Future June 29, 2026 | Register   Is your ...

Keep the Learning Going with the New Best of .conf Hub

Hello Splunkers, With .conf26 getting closer, there’s already a lot of excitement building around this year’s ...

Splunk Community Badges!

  Hey everyone! Ready to earn some serious bragging rights in the community? Along with our existing badges ...