Getting Data In

Transforms working intermittently on index cluster for AWS Kinesis to HEC

johnansett
Communicator

Hello Splunkers,

We are receiving config notifications, CloudTrail and others from AWS through Kinesis - the general pattern is:
Config -> Event Rules -> Event Hub -> Kinesis -> HEC (indexer cluster)
This works, what seems flawlessly.

We separate the data into indexes based on the account number due to security policies so I've set up props/transforms to do this.

This seems to work most of the time and 77% of the traffic ends up in the correct index but there is 33% (on avg) that ends up in the default index of the HEC (aws_config)

Is it possible that the transforms aren't triggering all the time?
The events are identical format; sourcetype and source are identical.

Here is the transforms:

[aws-account1]
REGEX = 010016492034
DEST_KEY = _MetaData:Index
FORMAT = aws-account1

Props:
[aws:config:notification]
TRANSFORMS-aws_config_notification=aws-account1

Am I missing something here? Is there anything I should look for in internal?

I remember years ago in training an example where props hierarchy would mess with data when there was multiple props/transforms, and the intermittent nature *might* make sense but I have no idea where to troubleshoot this.
The HEC is on a cluster of indexers so the config is all via the CM, thus no differences.

Any suggestions would be greatly appreciated!

Cheers!

1 Solution

johnansett
Communicator

Regex issue.  Multiple account numbers in events.

View solution in original post

0 Karma

johnansett
Communicator

Regex issue.  Multiple account numbers in events.

0 Karma
Get Updates on the Splunk Community!

.conf25 Community Recap

Hello Splunkers, And just like that, .conf25 is in the books! What an incredible few days — full of learning, ...

Splunk App Developers | .conf25 Recap & What’s Next

If you stopped by the Builder Bar at .conf25 this year, thank you! The retro tech beer garden vibes were ...

Congratulations to the 2025-2026 SplunkTrust!

Hello, Splunk Community! We are beyond thrilled to announce our newest group of SplunkTrust members!  The ...