Splunk Search

Having trouble setting up delims-based field extraction, fields are not showing up

natrixia
Explorer

I have a simple script that returns some fields in TSV form that looks like this:

Date\tJobName\tCounterName\tValue 

for example:

Apr 14 13:00:00 2011    AlignmentMetrics    SpliCounter 0

I want the splunk indexing/search to pick up these fields (i.e. date, job, counter, value) so I added this to splunk/etc/system/local/props.conf:

[imd-log]
TRANSFORMS = imd-header-fields

And I added this to splunk/etc/system/local/transforms.conf:

[imd-header-fields]
DELIMS = "\t"
FIELDS = "date","job","counter","value"

I then restarted splunk, went to manager/data-inputs remove the job, and added it again with sourcetype=imd-logs. Trouble is in the search app I don't see any of the new fields anywhere. What am I doing wrong?

Tags (1)
1 Solution

David
Splunk Employee
Splunk Employee

Porting my answer to the new splunk-base:

I believe what you want in your props.conf is:

[imd-log]
REPORT-PullTSVFields = imd-header-fields

You also stated sourcetype=imd-logs whereas you have imd-log in the header. You'll need to make sure that the stanza header in props.conf matches your sourcetype exactly.

In the old answers site, you followed-up with:

Thank for the reply. Also, is there a way for splunk to replace it's internal date (i.e. the ones that shows up in the 'search' app) with the date specified by 'logdate'?)

Splunk should automatically pick that up. What are you seeing as the time when you do a search?

View solution in original post

David
Splunk Employee
Splunk Employee

Porting my answer to the new splunk-base:

I believe what you want in your props.conf is:

[imd-log]
REPORT-PullTSVFields = imd-header-fields

You also stated sourcetype=imd-logs whereas you have imd-log in the header. You'll need to make sure that the stanza header in props.conf matches your sourcetype exactly.

In the old answers site, you followed-up with:

Thank for the reply. Also, is there a way for splunk to replace it's internal date (i.e. the ones that shows up in the 'search' app) with the date specified by 'logdate'?)

Splunk should automatically pick that up. What are you seeing as the time when you do a search?

Got questions? Get answers!

Join the Splunk Community Slack to learn, troubleshoot, and make connections with fellow Splunk practitioners in real time!

Meet up IRL or virtually!

Join Splunk User Groups to connect and learn in-person by region or remotely by topic or industry.

Get Updates on the Splunk Community!

Why Splunk Customers Should Attend Cisco Live 2026 Las Vegas

Why Splunk Customers Should Attend Cisco Live 2026 Las Vegas     Cisco Live 2026 is almost here, and this ...

What Is the Name of the USB Key Inserted by Bob Smith? (BOTS Hint, Not the Answer)

Hello Splunkers,   So you searched, “what is the name of the usb key inserted by bob smith?”  Not gonna lie… ...

Automating Threat Operations and Threat Hunting with Recorded Future

    Automating Threat Operations and Threat Hunting with Recorded Future June 29, 2026 | Register   Is your ...