Splunk Enterprise

Why is my log routing via props.conf and transforms.conf not working?

Shakeer_Spl
Explorer

Route logs from combined_large.log to webapp1_index or webapp2_index based on log content ([webapp1] or [webapp2]).

Setup:

  • Universal Forwarder: Windows (sending logs)

  • Indexer: Windows (receiving & parsing)

  • Logs contain [webapp1] or [webapp2]

  • Expect routing to happen on the Indexer

    Sample log:

    2025-05-03 16:41:36 [webapp1] Session timeout for user

    2025-04-13 20:25:59 [webapp2] User registered successfully

    inputs.conf (on UF):

    [monitor://C:\logs\combined_large.log]
    disabled = false
    sourcetype = custom_combined_log
    index = default

    props.conf (on Indexer):

    [custom_combined_log]
    TRANSFORMS-route_app_logs = route-webapp1_index, route-webapp2_index

    transforms.conf (on Indexer):

    [route-webapp1_index]
    REGEX = \[webapp1\]
    DEST_KEY = _MetaData:Index
    FORMAT = webapp1_index

    [route-webapp2_index]
    REGEX = \[webapp2\]
    DEST_KEY = _MetaData:Index
    FORMAT = webapp2_index

    Tried:

    • Verified file is being read

    • Confirmed btool loads configs

    • Restarted services

    • Re-indexed by duplicating the file

      Issue:

      Logs not appearing in either webapp1_index or webapp2_index

      Questions:

      • Is this config correct?

      • Am I missing a key step or wrong config location?

      • Any way to debug routing issues?

        Any help or insight would be greatly appreciated. Thanks in advance 🙏

         

         

Labels (1)
0 Karma

Shakeer_Spl
Explorer

sorry, for late response my issue has been fixed, thanks for your replies

0 Karma

PickleRick
SplunkTrust
SplunkTrust

Please share with the community what was wrong in your case - it might help others in the future.

0 Karma

livehybrid
SplunkTrust
SplunkTrust

Hi @Shakeer_Spl 

Are you able to see the data land in *any* index? (e.g main?) If so, can you confirm the sourcetype matches that configured in inputs.conf?

I assume (but want to cheeck) that the indexes have been created on the Indexers, and that you have appropriate RBAC/access to view the contents?

Are you able to see the UF sending logs to _internal on your indexers? If not this would indicate that the issue lies with for output (from UF) or input (into IDX)

Are there any other props/transforms that apply to that sourcetype in your props.conf?

Sorry for all the questions (in addition to those already asked re HF etc) , there is a lot of establish in a situation like this!

🌟 Did this answer help you? If so, please consider:

  • Adding karma to show it was useful
  • Marking it as the solution if it resolved your issue
  • Commenting if you need any clarification

Your feedback encourages the volunteers in this community to continue contributing

 

0 Karma

isoutamo
SplunkTrust
SplunkTrust
If you cannot find those events from any indexes, are you defined lastChangeIndex in your indexes.conf?
If not then it's time to add it.

lastChanceIndex = <index name>
* An index that receives events that are otherwise not associated
with a valid index.
* If you do not specify a valid index with this setting, such events are
dropped entirely.
* Routes the following kinds of events to the specified index:
* events with a non-existent index specified at an input layer, like an
invalid "index" setting in inputs.conf
* events with a non-existent index computed at index-time, like an invalid
_MetaData:Index value set from a "FORMAT" setting in transforms.conf
* You must set 'lastChanceIndex' to an existing, enabled index.
Splunk software cannot start otherwise.
* If set to "default", then the default index specified by the
'defaultDatabase' setting is used as a last chance index.
* Default: empty string
0 Karma

PickleRick
SplunkTrust
SplunkTrust

At first glance it should work.

1. Are you by any chance using INDEXED_EXTRACTIONS?

2. Is your data sent straight from UF to indexers or do you have any HF in the middle?

0 Karma
Get Updates on the Splunk Community!

Accelerating Observability as Code with the Splunk AI Assistant

We’ve seen in previous posts what Observability as Code (OaC) is and how it’s now essential for managing ...

Integrating Splunk Search API and Quarto to Create Reproducible Investigation ...

 Splunk is More Than Just the Web Console For Digital Forensics and Incident Response (DFIR) practitioners, ...

Congratulations to the 2025-2026 SplunkTrust!

Hello, Splunk Community! We are beyond thrilled to announce our newest group of SplunkTrust members!  The ...