Getting Data In

Removed the syslog-host transform - but hostname is still getting pulled from /var/log/messages

di2esysadmin
Path Finder

Sourcetype=syslog results are picking up the short hostname from the /var/log/messages file. I tried to correct this per the instructions here : http://answers.splunk.com/answers/6895/can-i-prevent-the-default-index-time-extraction-for-the-host-...

Specifically, I now have a local/props.conf file. The contents are as follows:

[syslog]
TRANSFORMS =

The output looks correct, TRANSFORMS is null. Yet the hostname is still getting set to the shortname, presumably from the shortname in the /var/log/messages file.

splunk cmd btool props list syslog --debug
Splunk_TA_ [syslog]
system ANNOTATE_PUNCT = True
system BREAK_ONLY_BEFORE =
system BREAK_ONLY_BEFORE_DATE = True
.
.
system TIME_FORMAT = %b %d %H:%M:%S
system TRANSFORMS =
system TRUNCATE = 10000
.
.

Any ideas?

Thanks,
Karla

1 Solution

jreuter_splunk
Splunk Employee
Splunk Employee

More information would be required to understand why this is not taking effect. First guess: did you make this change to props.conf on the forwarder? It needs to be configured on the indexer as the forwarder only handles the input stage. The following props.conf subset is applied on a universal/lightweight forwarder:

sourcetype CHARSET NO_BINARY_CHECK CHECK_METHOD CHECK_FOR_HEADER PREFIX_SOURCETYPE

Reference:
Where do I configure my Splunk settings?

Verify the above, along with the final sourcetype. Look for other transforms that are related to the source or other attributes. Reply to your open support case if none of this helps to resolve the issue.

View solution in original post

jreuter_splunk
Splunk Employee
Splunk Employee

More information would be required to understand why this is not taking effect. First guess: did you make this change to props.conf on the forwarder? It needs to be configured on the indexer as the forwarder only handles the input stage. The following props.conf subset is applied on a universal/lightweight forwarder:

sourcetype CHARSET NO_BINARY_CHECK CHECK_METHOD CHECK_FOR_HEADER PREFIX_SOURCETYPE

Reference:
Where do I configure my Splunk settings?

Verify the above, along with the final sourcetype. Look for other transforms that are related to the source or other attributes. Reply to your open support case if none of this helps to resolve the issue.

di2esysadmin
Path Finder

I did NOT make it on the indexer. Got it in one ! thanks.

0 Karma

di2esysadmin
Path Finder

As I suspected. Thanks Martin.

Any suggestions on how to solve the problem I posed? 🙂

0 Karma

martin_mueller
SplunkTrust
SplunkTrust

To change already-indexed data you would need to remove it and re-index.

0 Karma

di2esysadmin
Path Finder

An additional related question . . . once I get this working the way I want, is it possible to change the hostname settings for data already indexed? Or this that just a ridiculous question?

0 Karma
Got questions? Get answers!

Join the Splunk Community Slack to learn, troubleshoot, and make connections with fellow Splunk practitioners in real time!

Meet up IRL or virtually!

Join Splunk User Groups to connect and learn in-person by region or remotely by topic or industry.

Get Updates on the Splunk Community!

Index This | What travels the world but is also stuck in place?

April 2026 Edition  Hayyy Splunk Education Enthusiasts and the Eternally Curious!   We’re back with this ...

Discover New Use Cases: Unlock Greater Value from Your Existing Splunk Data

Realizing the full potential of your Splunk investment requires more than just understanding current usage; it ...

Continue Your Journey: Join Session 2 of the Data Management and Federation Bootcamp ...

As data volumes continue to grow and environments become more distributed, managing and optimizing data ...