Splunk Search

Creating a CSV file with host, index, sourcetype, source, and sourcepath (monitor), how do I extract the monitor field in a search?

splunkvickyloui
Explorer

Hi,

I have inputs.conf with below configuration details:

[monitor:///data02/appserver/jboss2/prod-ABCD-domain/servers/prod-ABCD-node02/log/access_log*]
sourcetype=jboss_server_access
source=ABCD_jboss_prod_accesslog_node2
index=prod_ABCD_jboss
ignoreOlderThan=1d

I would like to create one CSV file with all details like host, index, sourcetype, source, and sourcepath (monitor). I am able to retrieve the details of source, sourcetype by using values(). How shall I retrieve the value of monitor (remote path and file name)

 * | stats values(source), values(sourcetype) by host index

Thanks

0 Karma

badrinath_itrs
Communicator

Hi,

Can you extract the file name from internal index data itself.

index=_internal sourcetype=splunkd "monitor" | rex "monitor:(?<FilesMonitored>[^\n\r]+)"

I am not good with regex, but give a try .

0 Karma

splunkvickyloui
Explorer

Hi Badri,

Thanks. It filters correctly. I appreciate your help. Now I am struggling to combine both the searches

index=_internal sourcetype=splunkd "monitor" | rex "monitor:(?[^\n\r]+)"
and
* | stats values(source), values(sourcetype) by host index

I am expecting the results in a table format

Host, Index, Sourcetype, Source, FilesMonitored

0 Karma

hortonew
Builder

Generally speaking, it's not recommended to set your own "source" in inputs.conf. If you leave that part out, Splunk will automatically set the "source" field to the file that it monitored.

0 Karma

splunkvickyloui
Explorer

Hi hortonew,

Thanks. As you said, it works if I am not setting any name for "source". But I am wondering how come it displays(even if I set source) the file path and names in deployment server - /en-US/manager/search/deploymentsetup/app/data/inputs/remote_monitor?app_only=False&offset=0

Source path Host
/data01/home/jbservice/logs/exp_fct_inv_criteria_temp_201* None
/data01/home/jbservice/logs/imp_fct_inv_criteria_temp_201* None
/data01/home/jbservice/logs/imp_fct_inv_criteria_temp_201* None

0 Karma
Got questions? Get answers!

Join the Splunk Community Slack to learn, troubleshoot, and make connections with fellow Splunk practitioners in real time!

Meet up IRL or virtually!

Join Splunk User Groups to connect and learn in-person by region or remotely by topic or industry.

Get Updates on the Splunk Community!

Announcing Modern Navigation: A New Era of Splunk User Experience

We are excited to introduce the Modern Navigation feature in the Splunk Platform, available to both cloud and ...

Modernize your Splunk Apps – Introducing Python 3.13 in Splunk

We are excited to announce that the upcoming releases of Splunk Enterprise 10.2.x and Splunk Cloud Platform ...

Step into “Hunt the Insider: An Splunk ES Premier Mystery” to catch a cybercriminal ...

After a whole week of being on call, you fell asleep on your keyboard, and you hit a sequence of buttons that ...