New to Splunk Enterprise. Confused as to what the best approach for configuring multiple field extractions for a new sourcetype in a multihost deployment. Looking for search time extractions on a log like the one below. We have a deployment server and non-clustered search heads. I can build field extractions using the built in GUI tool but was told I need to migrate these to props/transforms conf files to get them working across my SH deployment. I've read through some these files included in the TAs we've onboarded but not sure I'm following the mapping correct.
Example log:
INFO | jvm 3 | 2017/03/12 22:07:13 | ERROR [QueryExecutor[sourcesystem] ] [22:07:13,198]: No historical information could be found for any of the specified paths. Check that paths are correct. Paths: [example/path]
Existing props.conf file put in by PS to handle the wonky jvm log format:
[widget]
SHOULD_LINEMERGE=false
NO_BINARY_CHECK=true
CHARSET=UTF-8
MAX_TIMESTAMP_LOOKAHEAD=50
TRUNCATE=99999
disabled=false
TIME_FORMAT=%Y/%m/%d %H:%M:%S
TIME_PREFIX=^.jvm\s1\s+|\s
LINE_BREAKER=([\r\n]+).\d{4}/\d{2}/\d{2}\s\d{2}:\d{2}:\d{2}\s| \w
Hi uhaba,
The prop.conf you show here contain fields which are not related to search time field extractions but have to do with how Splunk should store the data in the index.
For props.conf and transforms.conf the docs are very good. The same for deployment.