Getting Data In

Unable to see data in fields on Splunk 6


I am fairly new to splunk so please pardon any beginner's mistakes:

I am trying to setup Splunk to receive csv files via Universal Forwarder on windows 2k3 server and use header of the file to attach fields. I have done following:

On the universal forwarder:
[monitor://c:\some directory]
disabled = false
sourcetype = SBRAccounting
crcSalt =

On the Splunk server where indexer and search head are same, i created a new custom app and the /opt/splunk/etc/apps/SBRAccounting/local, I created props.conf file with following content:

I see the data coming into Splunk with sourcetype=SBRAccounting and index=sbr but fields are not there.

I created a dummy file on the Splunk server and created inputs.conf file with following to prove props.conf file is configured correctly, and it seems to show field along with the data.

Sample of the data is following:

"field1", "field2", "field3", ... 'field100"
"data1", "data2", "data3",,,,,,,,"data(n)"
"data1", "data2", "data3",,,,,,,,"data(n)"

I feel that data coming in via forwarders is not being passed by my custom apps's props.conf file. I even created an inputs.conf file with following and that didn't work either.

I need your help please.


Tags (3)

Splunk Employee
Splunk Employee

Reading carefully through the doc it looks like the props.conf on both the forwarder and the indexer need to contain the directives that explain what to do with the header.

So while your experiment has you half way there, and you might have accidentally hit pay dirt, it isn't quite aligned yet.

The doc repeatedly instructs a "restart" after config changes but you can also do a

and get the same result without restarting... ususally

Forward data extracted from header files You can also forward fields extracted from a file with headers to another Splunk instance.

To forward fields extracted from structured data files, follow this procedure:

  1. On the Splunk instance that monitors the files, edit props.conf and inputs.conf as described in "Edit configuration files to create and reference sourcetypes" earlier in this topic.

  2. Next, configure the system to forward data to another Splunk instance.
Note: Read "Set up forwarding and receiving" in the Distributed Deployment Manual for instructions on how to configure Splunk instances to forward and receive data.

  1. On the Splunk instance that is to receive the data, configure Splunk to be a receiver.

  2. On the receiving Splunk instance, create props.conf in $SPLUNK_HOME/etc/system/local, if it does not already exist.

  3. Copy the appropriate stanzas from props.conf on the monitoring Splunk instance to the props.conf you just created on the receiving Splunk instance.

  4. Restart Splunk on the receiving instance.

  5. Restart Splunk on the monitoring instance.

  6. On the receiving instance, use the Search app to confirm that Splunk has extracted the fields from the structured data files and indexed them properly.

Another thing to note however, is that there is a Caveat noted in the next section of the doc. You have empty fields in your data. If you use the automatic extraction facility, Splunk will not extract fields that basically do not exist. In other words... if the field is represented only by , , it will not extract the field. If that field is represented by ," ", it will. See the doc for more details.

With Splunk... the answer is always "YES!". It just might require more regex than you're prepared for!
0 Karma


Having same issue - no response yet...

0 Karma