Splunk Search

Field extractions are not working in distributed search

lrhazi
Path Finder

I have this defined in an app on the search head:

In pops.conf:

[bigip-syslog]
TRANSFORMS-null = setnull-f5-probes
REPORT-f5-fields = f5-fields

In transforms.conf:

[setnull-f5-probes]
REGEX = send:\s+string$
DEST_KEY = queue
FORMAT = nullQueue

[f5-fields]
REGEX = (.)
FORMAT = gu::$1

It looks like the filtering the null part works fine.. but the field extractions are not working.
In the above example, I never see the field "gu" being created in search results for sourcetype=bigip-syslog

What am I missing?

0 Karma
1 Solution

gkanapathy
Splunk Employee
Splunk Employee

are you running your search in the same app in which the extraction is defined? if not, the search-time rule must be exported to be globally available (or in 5.0, to be visible in the app in which you are running). You can do this in the admin GUI, or by editing the /metadata/local.meta file in the app. reference: http://docs.splunk.com/Documentation/Splunk/5.0/Admin/Defaultmetaconf

View solution in original post

0 Karma

gkanapathy
Splunk Employee
Splunk Employee

are you running your search in the same app in which the extraction is defined? if not, the search-time rule must be exported to be globally available (or in 5.0, to be visible in the app in which you are running). You can do this in the admin GUI, or by editing the /metadata/local.meta file in the app. reference: http://docs.splunk.com/Documentation/Splunk/5.0/Admin/Defaultmetaconf

0 Karma

lrhazi
Path Finder

I created my app by just creating the directories under etc/app and was thinking of it as non visual app... guess it does matter. I used the "manage" GUI to enable and launch the app and sure enough, my fields are all there! thanks a lot.

0 Karma
Get Updates on the Splunk Community!

Fun with Regular Expression - multiples of nine

Fun with Regular Expression - multiples of nineThis challenge was first posted on Slack #regex channel ...

[Live Demo] Watch SOC transformation in action with the reimagined Splunk Enterprise ...

Overwhelmed SOC? Splunk ES Has Your Back Tool sprawl, alert fatigue, and endless context switching are making ...

What’s New & Next in Splunk SOAR

Security teams today are dealing with more alerts, more tools, and more pressure than ever.  Join us on ...