Splunk Search

Logs are showing raw, how do I get them to show as highlighted?

bryhoffman
Explorer

When I click on the raw log and back out of it it shows up as highlighted. How do I default the sourcetype/source to always show as highlighted? I've messed with the props.conf and can't get it.

This only started occur after we migrated from On-Prem Splunk to Splunk Cloud. Before, these logs would automatically show up/parsed in JSON

0 Karma
1 Solution

richgalloway
SplunkTrust
SplunkTrust

If the data is same as before, but the presentation is different then there is something different in the settings now.

Use the btool command (part of the Admin's Little Helper app - a mandatory app for Splunk Cloud customers, IMO) to review the settings to make sure they are being applied as expected.

---
If this reply helps you, Karma would be appreciated.

View solution in original post

0 Karma

erikwie
Path Finder

Are you sending the logs directly to Splunk Cloud or thru a Intermediate Forwarder?

An app with props.conf and transforms.conf uploaded to Splunk Cloud is run on the Search Head.
In my cases I had to install the app on the Intermediate Forwarder that sends on-prem logs to Splunk Cloud, when it worked as it had done before migrating to the cloud.

isoutamo
SplunkTrust
SplunkTrust

Have you migrated/moved those original props.conf from onprem to cloud? If you still have those somewhere just create an app from those and install it into cloud. Of course you must ensure that those have precedence over current configuration in cloud.

0 Karma

bryhoffman
Explorer

Thanks for the response. Everything was migrated over and is exactly this same as before.

You would think there would be a toggle to always use highlighted syntax since it's already parsing JSON..

0 Karma

richgalloway
SplunkTrust
SplunkTrust

If the data is same as before, but the presentation is different then there is something different in the settings now.

Use the btool command (part of the Admin's Little Helper app - a mandatory app for Splunk Cloud customers, IMO) to review the settings to make sure they are being applied as expected.

---
If this reply helps you, Karma would be appreciated.
0 Karma
Career Survey
First 500 qualified respondents will receive a $20 gift card! Tell us about your professional Splunk journey.
Get Updates on the Splunk Community!

Tech Talk Recap | Mastering Threat Hunting

Mastering Threat HuntingDive into the world of threat hunting, exploring the key differences between ...

Observability for AI Applications: Troubleshooting Latency

If you’re working with proprietary company data, you’re probably going to have a locally hosted LLM or many ...

Splunk AI Assistant for SPL vs. ChatGPT: Which One is Better?

In the age of AI, every tool promises to make our lives easier. From summarizing content to writing code, ...