Getting Data In

Results returning wrong eventtypes


I have used batch to import a couple gigs of syslog data from an application. When I search for those application events they are assocated with a large number of completely unrelated eventtypes.

Example log message: Nov 19 00:15:39 servername (bpi-db-1001): Returning Connection to Jboss pool

Eventtypes associated to this: eventtype=auditd Options| eventtype=cpu Options| eventtype=df check df host success Options| eventtype=hardware Options| eventtype=interfaces Options| eventtype=iostat cpu iostat report resource success Options| eventtype=lastlog Options| eventtype=lsof file lsof report resource success Options| eventtype=netstat cpu netstat os report success Options| eventtype=openPorts Options| eventtype=package Options| eventtype=protocol Options| eventtype=ps os process ps report success Options| eventtype=top os process report success top Options| eventtype=unix-all-logs Options| eventtype=usersWithLoginPrivs Options| eventtype=vmstat memory report resource success vmstat Options| eventtype=who

The only changes I've made to the server from out of box was configuring distributed search and enabling the unix & windows app.

For example in $SPLUNK_HOME/etc/apps/unix/default/eventtypes.conf defines the lsof eventtype as "sourcetype = lsof"

Tags (2)

Re: Results returning wrong eventtypes


This is a known issue that has been reported to support. The issue here is that some bad unix app's event types were made visible in all apps. This makes all events in all apps match the bad eventtypes that were added to the unix app. The eventypes.conf (apps/unix/default) file contained a bunch of entries that are missing the "search =" in front of the queries. Adding this and restarting splunk appears to have fixed this issue without causing other problems. Here is a sample of the bad event types, they are all under this scripted-input section.

# an eventtype for every scripted-input sourcetype
sourcetype = vmstat

I just copied the file into $SPLUNK_HOME/apps/unix/local and removed everything above

# an eventtype for every scripted-input sourcetype

After this I prepended search = to each sourcetype, so the new file followed this format:

# an eventtype for every scripted-input sourcetype
search = sourcetype = vmstat

search = sourcetype = iostat

search = sourcetype = ps

search = sourcetype = top

View solution in original post

Speak Up for Splunk Careers!

We want to better understand the impact Splunk experience and expertise has has on individuals' careers, and help highlight the growing demand for Splunk skills.