Getting Data In

Split sourcetype + indexed fields

michael_vi
Path Finder

I have an issue with adding indexed fields to each of the new (splatted) sourcetype:

Configuration that "duplicated" indexed fields for each sourcetype:

Now I see fields: indexedfileds1, indexedfileds2 and indexedfileds3 as 200%,

For example: indexedfields1 values:

valuie1 150%

value2 50%

props.conf

[MAIN SOURCE]
SHOULD_LINEMERGE = false
LINE_BREAKER = ([\r\n]+)
TIME_PREFIX = {\"time\":\"
MAX_TIMESTAMP_LOOKAHEAD = 25
TIME_FORMAT = %Y-%m-%dT%H:%M:%S.%6N%:z
TRUNCATE = 999999 
TRANSFORMS-changesourcetype = sourcetype1, sourcetype2
TRANSFORMS-indexedfields = indexedfield1, indexedfield2, indexedfield3

[sourcetype1]
SHOULD_LINEMERGE = false
LINE_BREAKER = ([\r\n]+)
TIME_PREFIX = {\"time\":\"
MAX_TIMESTAMP_LOOKAHEAD = 25
TIME_FORMAT = %Y-%m-%dT%H:%M:%S.%6N%:z
TRUNCATE = 999999 

[sourcetype2]
SHOULD_LINEMERGE = false
LINE_BREAKER = ([\r\n]+)
TIME_PREFIX = {\"time\":\"
MAX_TIMESTAMP_LOOKAHEAD = 25
TIME_FORMAT = %Y-%m-%dT%H:%M:%S.%6N%:z
TRUNCATE = 999999 

transforms.conf

[indexedfield1]
REGEX=
FORMAT=
WRITE_META=

[indexedfield2]
REGEX=
FORMAT=
WRITE_META=

[indexedfield3]
REGEX=
FORMAT=
WRITE_META=

[sourcetype1]
DEST_KEY-MetaData:Sourcetype
REGEX = some regex
FORMAT = sourcetype::sourcetype1

[sourcetype2]
DEST_KEY-MetaData:Sourcetype
REGEX = some regex
FORMAT = sourcetype::sourcetype2

 

I thought to move the indexed fields to each of the new sourcetype but then I see no indexed fields.

Check with | tstats count

props.conf

[MAIN SOURCE]
SHOULD_LINEMERGE = false
LINE_BREAKER = ([\r\n]+)
TIME_PREFIX = {\"time\":\"
MAX_TIMESTAMP_LOOKAHEAD = 25
TIME_FORMAT = %Y-%m-%dT%H:%M:%S.%6N%:z
TRUNCATE = 999999 
TRANSFORMS-changesourcetype = sourcetype1, sourcetype2

[sourcetype1]
SHOULD_LINEMERGE = false
LINE_BREAKER = ([\r\n]+)
TIME_PREFIX = {\"time\":\"
MAX_TIMESTAMP_LOOKAHEAD = 25
TIME_FORMAT = %Y-%m-%dT%H:%M:%S.%6N%:z
TRUNCATE = 999999 
TRANSFORMS-indexedfields = indexedfield1, indexedfield2, indexedfield3

[sourcetype2]
SHOULD_LINEMERGE = false
LINE_BREAKER = ([\r\n]+)
TIME_PREFIX = {\"time\":\"
MAX_TIMESTAMP_LOOKAHEAD = 25
TIME_FORMAT = %Y-%m-%dT%H:%M:%S.%6N%:z
TRUNCATE = 999999 
TRANSFORMS-indexedfields = indexedfield1, indexedfield2, indexedfield3

 

What is the needed configuration to see indexed fields per sourcetype, w/o showing 200%

Thanks

Labels (2)
0 Karma

michael_vi
Path Finder

Nope,

No JSON. CEF events

0 Karma

isoutamo
SplunkTrust
SplunkTrust
Can you give some scrambled test events to check this?
0 Karma

isoutamo
SplunkTrust
SplunkTrust
Hi
You have those on indexer(s)/heavy forwarders and your source is probably json?
Do you have on SH side KV_MODE=json definition for those sourcetypes?
r. Ismo
0 Karma
Get Updates on the Splunk Community!

.conf24 | Day 0

Hello Splunk Community! My name is Chris, and I'm based in Canberra, Australia's capital, and I travelled for ...

Enhance Security Visibility with Splunk Enterprise Security 7.1 through Threat ...

(view in My Videos)Struggling with alert fatigue, lack of context, and prioritization around security ...

Troubleshooting the OpenTelemetry Collector

  In this tech talk, you’ll learn how to troubleshoot the OpenTelemetry collector - from checking the ...