Getting Data In

Removed the syslog-host transform - but hostname is still getting pulled from /var/log/messages

di2esysadmin
Path Finder

Sourcetype=syslog results are picking up the short hostname from the /var/log/messages file. I tried to correct this per the instructions here : http://answers.splunk.com/answers/6895/can-i-prevent-the-default-index-time-extraction-for-the-host-...

Specifically, I now have a local/props.conf file. The contents are as follows:

[syslog]
TRANSFORMS =

The output looks correct, TRANSFORMS is null. Yet the hostname is still getting set to the shortname, presumably from the shortname in the /var/log/messages file.

splunk cmd btool props list syslog --debug
Splunk_TA_ [syslog]
system ANNOTATE_PUNCT = True
system BREAK_ONLY_BEFORE =
system BREAK_ONLY_BEFORE_DATE = True
.
.
system TIME_FORMAT = %b %d %H:%M:%S
system TRANSFORMS =
system TRUNCATE = 10000
.
.

Any ideas?

Thanks,
Karla

1 Solution

jreuter_splunk
Splunk Employee
Splunk Employee

More information would be required to understand why this is not taking effect. First guess: did you make this change to props.conf on the forwarder? It needs to be configured on the indexer as the forwarder only handles the input stage. The following props.conf subset is applied on a universal/lightweight forwarder:

sourcetype CHARSET NO_BINARY_CHECK CHECK_METHOD CHECK_FOR_HEADER PREFIX_SOURCETYPE

Reference:
Where do I configure my Splunk settings?

Verify the above, along with the final sourcetype. Look for other transforms that are related to the source or other attributes. Reply to your open support case if none of this helps to resolve the issue.

View solution in original post

jreuter_splunk
Splunk Employee
Splunk Employee

More information would be required to understand why this is not taking effect. First guess: did you make this change to props.conf on the forwarder? It needs to be configured on the indexer as the forwarder only handles the input stage. The following props.conf subset is applied on a universal/lightweight forwarder:

sourcetype CHARSET NO_BINARY_CHECK CHECK_METHOD CHECK_FOR_HEADER PREFIX_SOURCETYPE

Reference:
Where do I configure my Splunk settings?

Verify the above, along with the final sourcetype. Look for other transforms that are related to the source or other attributes. Reply to your open support case if none of this helps to resolve the issue.

di2esysadmin
Path Finder

I did NOT make it on the indexer. Got it in one ! thanks.

0 Karma

di2esysadmin
Path Finder

As I suspected. Thanks Martin.

Any suggestions on how to solve the problem I posed? 🙂

0 Karma

martin_mueller
SplunkTrust
SplunkTrust

To change already-indexed data you would need to remove it and re-index.

0 Karma

di2esysadmin
Path Finder

An additional related question . . . once I get this working the way I want, is it possible to change the hostname settings for data already indexed? Or this that just a ridiculous question?

0 Karma
Career Survey
First 500 qualified respondents will receive a $20 gift card! Tell us about your professional Splunk journey.

Can’t make it to .conf25? Join us online!

Get Updates on the Splunk Community!

Leveraging Automated Threat Analysis Across the Splunk Ecosystem

Enhance Security Operations with Automated Threat Analysis in the Splunk EcosystemAre you leveraging ...

What Is Splunk? Here’s What You Can Do with Splunk

Hey Splunk Community, we know you know Splunk. You likely leverage its unparalleled ability to ingest, index, ...

Level Up Your .conf25: Splunk Arcade Comes to Boston

With .conf25 right around the corner in Boston, there’s a lot to look forward to — inspiring keynotes, ...