Getting Data In

What is the best way to fork events into a new sourcetype that will eventually become the only sourcetype?

thisissplunk
Builder

Basically, I want to have ONE log file populating TWO sourcetypes at the same time. Identical events in both. Eventually, I'll kill off the old sourcetype and only have the events going into the sourcetype with the new name.

I'm doing this because I want to check parity and catch bugs or other issues for the new sourcetype. What is the best approach for this?

0 Karma

esix_splunk
Splunk Employee
Splunk Employee

So to clarify, you are indexing one log file, twice, as two different sourcetypes.

If you are indexing the same file twice, what kind of differences are you expecting to catch?

In the end, you just drop the monitor / input for the sourcetype you want to get rid of.

0 Karma
Get Updates on the Splunk Community!

Index This | What is broken 80% of the time by February?

December 2025 Edition   Hayyy Splunk Education Enthusiasts and the Eternally Curious!    We’re back with this ...

Unlock Faster Time-to-Value on Edge and Ingest Processor with New SPL2 Pipeline ...

Hello Splunk Community,   We're thrilled to share an exciting update that will help you manage your data more ...

Splunk MCP & Agentic AI: Machine Data Without Limits

Discover how the Splunk Model Context Protocol (MCP) Server can revolutionize the way your organization uses ...