Getting Data In

Sourcetype not searcheable

TiagoTLD1
Communicator

Hello,

I am facing this behaviour: when searching for thin index, I see events of sourcetype=broker, like shown in the image below.

alt text

When searching only for sourcetype=broker, no event shows up:

alt text

Any idea why?

0 Karma
1 Solution

TiagoTLD1
Communicator

Thanks to @joao_amorim

Found my mistake:

[broker]
DEST_KEY = MetaData:Sourcetype
REGEX = (B1)
FORMAT = sourcetype::broker

View solution in original post

0 Karma

TiagoTLD1
Communicator

Thanks to @joao_amorim

Found my mistake:

[broker]
DEST_KEY = MetaData:Sourcetype
REGEX = (B1)
FORMAT = sourcetype::broker

0 Karma

amirrashid
New Member

@TiagoTLD1

Can u elaborate how u fix this issue as i facing the same issue and i am unable to understand what u actually did to get the results by source type.

0 Karma

TiagoTLD1
Communicator

Agree on that, but what about if the search "index=esi_tests sourcetype=broker" also does not return any values?

0 Karma

andrey2007
Contributor

Can you add sourcetype value using field picker to your search?

0 Karma

TiagoTLD1
Communicator

Yes I did that in my splunk. Also, to prevent hidden spaces in my sourcetype name, I used this:

index=esi_tests | search sourcetype=b*.

Also got no results

0 Karma

andrey2007
Contributor

Hello, TiagoTLD1
By default splunk searches index=main (default index)
so it may be the reason of such behavior

0 Karma
Get Updates on the Splunk Community!

Unlock Database Monitoring with Splunk Observability Cloud

  In today’s fast-paced digital landscape, even minor database slowdowns can disrupt user experiences and ...

Purpose in Action: How Splunk Is Helping Power an Inclusive Future for All

At Cisco, purpose isn’t a tagline—it’s a commitment. Cisco’s FY25 Purpose Report outlines how the company is ...

[Upcoming Webinar] Demo Day: Transforming IT Operations with Splunk

Join us for a live Demo Day at the Cisco Store on January 21st 10:00am - 11:00am PST In the fast-paced world ...