Getting Data In

Removed the syslog-host transform - but hostname is still getting pulled from /var/log/messages

di2esysadmin
Path Finder

Sourcetype=syslog results are picking up the short hostname from the /var/log/messages file. I tried to correct this per the instructions here : http://answers.splunk.com/answers/6895/can-i-prevent-the-default-index-time-extraction-for-the-host-...

Specifically, I now have a local/props.conf file. The contents are as follows:

[syslog]
TRANSFORMS =

The output looks correct, TRANSFORMS is null. Yet the hostname is still getting set to the shortname, presumably from the shortname in the /var/log/messages file.

splunk cmd btool props list syslog --debug
Splunk_TA_ [syslog]
system ANNOTATE_PUNCT = True
system BREAK_ONLY_BEFORE =
system BREAK_ONLY_BEFORE_DATE = True
.
.
system TIME_FORMAT = %b %d %H:%M:%S
system TRANSFORMS =
system TRUNCATE = 10000
.
.

Any ideas?

Thanks,
Karla

1 Solution

jreuter_splunk
Splunk Employee
Splunk Employee

More information would be required to understand why this is not taking effect. First guess: did you make this change to props.conf on the forwarder? It needs to be configured on the indexer as the forwarder only handles the input stage. The following props.conf subset is applied on a universal/lightweight forwarder:

sourcetype CHARSET NO_BINARY_CHECK CHECK_METHOD CHECK_FOR_HEADER PREFIX_SOURCETYPE

Reference:
Where do I configure my Splunk settings?

Verify the above, along with the final sourcetype. Look for other transforms that are related to the source or other attributes. Reply to your open support case if none of this helps to resolve the issue.

View solution in original post

jreuter_splunk
Splunk Employee
Splunk Employee

More information would be required to understand why this is not taking effect. First guess: did you make this change to props.conf on the forwarder? It needs to be configured on the indexer as the forwarder only handles the input stage. The following props.conf subset is applied on a universal/lightweight forwarder:

sourcetype CHARSET NO_BINARY_CHECK CHECK_METHOD CHECK_FOR_HEADER PREFIX_SOURCETYPE

Reference:
Where do I configure my Splunk settings?

Verify the above, along with the final sourcetype. Look for other transforms that are related to the source or other attributes. Reply to your open support case if none of this helps to resolve the issue.

di2esysadmin
Path Finder

I did NOT make it on the indexer. Got it in one ! thanks.

0 Karma

di2esysadmin
Path Finder

As I suspected. Thanks Martin.

Any suggestions on how to solve the problem I posed? 🙂

0 Karma

martin_mueller
SplunkTrust
SplunkTrust

To change already-indexed data you would need to remove it and re-index.

0 Karma

di2esysadmin
Path Finder

An additional related question . . . once I get this working the way I want, is it possible to change the hostname settings for data already indexed? Or this that just a ridiculous question?

0 Karma
Career Survey
First 500 qualified respondents will receive a $20 gift card! Tell us about your professional Splunk journey.
Get Updates on the Splunk Community!

Observe and Secure All Apps with Splunk

 Join Us for Our Next Tech Talk: Observe and Secure All Apps with SplunkAs organizations continue to innovate ...

What's New in Splunk Observability - August 2025

What's New We are excited to announce the latest enhancements to Splunk Observability Cloud as well as what is ...

Introduction to Splunk AI

How are you using AI in Splunk? Whether you see AI as a threat or opportunity, AI is here to stay. Lucky for ...