Splunk Search

Index-time field extraction issue

perezcla
New Member

Hello all,

I'm a bit stuck with my issue.
I do have this splunk infra :
Sources ==> UF ==> Indexer cluster (3 + master) Search head cluster.

I'm trying to extract fields at index time to transform it in a future.

My props.conf and transfroms.conf are deployed in indexers throught the master.

log line look like :
date="2017-09-08",time="08:08:00",s-ip="8.8.8.8",time-taken="8",c-ip="9.9.9.9",c-port="45687",s-action="TCP_DENIED",cs-user="foobar"

transforms.conf

[fieldtestextract]
WRITE_META = true
REGEX=cs-user="([^"]+)
FORMAT=csuser::$1

props.conf

[web:access:file]
TRANSFORMS-csuser = fieldtestextract
TZ = utc
SEDCMD-username =  s/,cs-user=\"[^\"]+\",/,cs-user="xxxx",/g

The SEDCMD is working like a charm but the tranforms won't work...
fields.conf on search heads :

[csuser]
INDEXED = true
INDEXED_VALUE = true

I don't see my field on search head and obsiously i'm not able to execute query against it.

Could you help me figuring out what's wrong with my configuration ?

Many thanks in advance.

0 Karma

perezcla
New Member

I have found my mistake... my transforms file was named transform.conf (no S ...) It 's now working 🙂

0 Karma

DalJeanis
Legend

@perezcla - thanks for posting your solution. We've moved your comment to an answer. Please accept your answer so that the question will show as closed. - dal

Get Updates on the Splunk Community!

Splunk Mobile: Your Brand-New Home Screen

Meet Your New Mobile Hub  Hello Splunk Community!  Staying connected to your data—no matter where you are—is ...

Introducing Value Insights (Beta): Understand the Business Impact your organization ...

Real progress on your strategic priorities starts with knowing the business outcomes your teams are delivering ...

Enterprise Security (ES) Essentials 8.3 is Now GA — Smarter Detections, Faster ...

As of today, Enterprise Security (ES) Essentials 8.3 is now generally available, helping SOC teams simplify ...