Splunk Search

How to resolve Splunk from missing some automatically recognized source types?

quantumburnz
Engager

I have transforms like access-extractions and access-request, which map to the automatically recognized source types like access_combined, access_combined_wcookie, and access_common in the Field Extractions. Fields from events with these sourcetypes have fields extracted at search time as they should. However, the automatically recognized source types list also mentions: websphere_trlog_syserr and websphere_trlog_sysout. I have a websphere_trlog but not the other two. These should be built-in and not require any other specific app, right? Why would I be missing these two?

Ref: http://docs.splunk.com/Documentation/Splunk/6.4.3/Data/Listofpretrainedsourcetypes

Splunk version 6.4.3

0 Karma

woodcock
Esteemed Legend

You should never, Never, NEVER rely on Splunk's automatic sourcetyping feature (IMHO this should be deprecated and removed). You, as the admin, should ALWAYS manually sourcetype everything that you forward into splunk and you should consult and conform to this document:

http://docs.splunk.com/Documentation/Splunk/6.6.2/Data/Listofpretrainedsourcetypes
YOU should be the one to do this mapping with a sourcetype=<foo> inside of EVERY stanza in EVERY inputs.conf.

0 Karma

quantumburnz
Engager

Thanks woodcock - that's some pretty strong wording. 🙂

The sourcetypes don't currently conform to the document so they'll need to be renamed. Regardless, once this is done, I still want Splunk to properly extract fields at search time but there's no definition for these sourcetypes in props.conf.

What would cause this? The extractions should be available by default, correct? Hence "pretrained sourcetypes."

0 Karma

woodcock
Esteemed Legend

This product is not a magic 8-ball or genie in a bottle; it can't know everything. Check splunkbase for an app related to your source/sourcetype; if you are using enterprise software, it is probably there. If not, you will have to build your own field extractions or force the product to output it's stuff in something Splunk automatically groks like JSON, CEP, CSV, or KVPs.

0 Karma

quantumburnz
Engager

Agree - there's no such thing as a "silver bullet." However, I guess my question comes down to: Is there a built-in extraction for all of the pretrained sourcetypes? I assumed there was; otherwise, what's the point of the "pretrained?"

0 Karma

woodcock
Esteemed Legend

I suppose that is a good point. Start with the CIM app:
https://splunkbase.splunk.com/app/1621/
It changes frequently. Build out from there.

0 Karma
Got questions? Get answers!

Join the Splunk Community Slack to learn, troubleshoot, and make connections with fellow Splunk practitioners in real time!

Meet up IRL or virtually!

Join Splunk User Groups to connect and learn in-person by region or remotely by topic or industry.

Get Updates on the Splunk Community!

Announcing Modern Navigation: A New Era of Splunk User Experience

We are excited to introduce the Modern Navigation feature in the Splunk Platform, available to both cloud and ...

Modernize your Splunk Apps – Introducing Python 3.13 in Splunk

We are excited to announce that the upcoming releases of Splunk Enterprise 10.2.x and Splunk Cloud Platform ...

Step into “Hunt the Insider: An Splunk ES Premier Mystery” to catch a cybercriminal ...

After a whole week of being on call, you fell asleep on your keyboard, and you hit a sequence of buttons that ...