Splunk Search

Is there a way to find which props.conf and/or transforms.conf file is applied to a specific sourcetype for search-time field extractions?


I have certain logs which are indexed correctly. Field extraction using props.conf and transforms.conf works correctly when I am searching within the indexer. However, when I am copying the same set of props and transforms file to the search head, field extraction does not work.

I have put props and transforms under .../ets/apps/search/local in the search head and trying to search within the apps search. Looks like seems something else is taking precedence.

I am just searching:


There is only one type of data in that index.

My question is, is there a way to find which props and/or transforms file applied to a specific sourcetype?

I tried the following command

splunk cmd btool --app=search props list

which shows the following output

FIELDALIAS-src = c_ip AS src
KV_MODE = none
REPORT-cfx = kv_for_cf
TRANSFORMS-sourcetype = nullPound
category = Web
description = AWS cloudfront logs
pulldown_type = true
EVAL-MB = sc_bytes/(1024*1024)
EXTRACT-useragent = userAgent=(?P<browser>[^ (]+)
EXTRACT-fields = (?i)^(?:[^ ]* ){2}(?:[+\-]\d+ )?(?P<log_level>[^ ]*)\s+(?P<component>[^ ]+) - (?P<message>.+)
0 Karma

Splunk Employee
Splunk Employee

The btool invocation you've used is focused only upon the contents of the "search" app. There are some default behaviors that may be shining through from the base package install. Let me instead suggest splunk cmd btool props list sc --debug. This says "show me the (merged) contents of 'props(.conf)' for stanzas (sourcetypes) starting with 'sc' and show me exactly where the config came from."