Splunk Search

Can't extract named fields

hortone
New Member

I am collecting syslogs from the network (UDP 514) and they are all coming in as sourcetype=syslog. I did not see a choice for auto. Because of this, I can't search for sourcetype=named. I tried to manually extract the fields but I keep getting the error "can't extract named fields". I need to be able to monitor the queries. Is there a way to make these events show as DNS queries?

Tags (1)
0 Karma

kenth
Splunk Employee
Splunk Employee

You need to make splunk recognize that it's logs from named and then rewrite the sourcetype. The way you do this is with a combination of props.conf and transforms.conf

transforms.conf

[force_named_sourcetype]
SOURCE_KEY = MetaData::Source
DEST_KEY = MetaData::Sourcetype
REGEX = (named:)
FORMAT = sourcetype::named

props.conf

[source::udp:514]
TRANFORMS-force-named = force_named_sourcetype

Voilá!

Get Updates on the Splunk Community!

Upcoming Webinar: Unmasking Insider Threats with Slunk Enterprise Security’s UEBA

Join us on Wed, Dec 10. at 10AM PST / 1PM EST for a live webinar and demo with Splunk experts! Discover how ...

.conf25 technical session recap of Observability for Gen AI: Monitoring LLM ...

If you’re unfamiliar, .conf is Splunk’s premier event where the Splunk community, customers, partners, and ...

A Season of Skills: New Splunk Courses to Light Up Your Learning Journey

There’s something special about this time of year—maybe it’s the glow of the holidays, maybe it’s the ...