Getting Data In

What is the best way to fork events into a new sourcetype that will eventually become the only sourcetype?

thisissplunk
Builder

Basically, I want to have ONE log file populating TWO sourcetypes at the same time. Identical events in both. Eventually, I'll kill off the old sourcetype and only have the events going into the sourcetype with the new name.

I'm doing this because I want to check parity and catch bugs or other issues for the new sourcetype. What is the best approach for this?

0 Karma

esix_splunk
Splunk Employee
Splunk Employee

So to clarify, you are indexing one log file, twice, as two different sourcetypes.

If you are indexing the same file twice, what kind of differences are you expecting to catch?

In the end, you just drop the monitor / input for the sourcetype you want to get rid of.

0 Karma
Get Updates on the Splunk Community!

Celebrating Fast Lane: 2025 Authorized Learning Partner of the Year

At .conf25, Splunk proudly recognized Fast Lane as the 2025 Authorized Learning Partner of the Year. This ...

Tech Talk Recap | Mastering Threat Hunting

Mastering Threat HuntingDive into the world of threat hunting, exploring the key differences between ...

Observability for AI Applications: Troubleshooting Latency

If you’re working with proprietary company data, you’re probably going to have a locally hosted LLM or many ...