Splunk Search

We have tried to extract index time field extarction

rvinil
New Member

We have tried to extract index time field extraction, below are the details..
props.conf:-

[sourcetype]
TRANSFORMS-fieldname = fieldname

Transforms.conf:-

[fieldname]
REGEX = regexquery
FORMAT = fieldname::"$1"
SOURCE_KEY = fieldname

fields.conf:-

[fieldname]
INDEXED = true

Thanks in advance

Tags (1)
0 Karma
1 Solution

micahkemp
Champion

You also need WRITE_META = true in your transform.

Also make sure your regex has a capturing group. Your format line says to use the first capture group as the field value.

View solution in original post

0 Karma

nkchaitanya
Explorer

try as

Transforms.conf
[fieldname]
REGEX =regex
FORMAT = fieldname::"$1"
SOURCE_KEY = fieldname
WRITE_META = true

in Props.conf
[sourcetype]
REPORT-fieldname = fieldname
NO_BINARY_CHECK = true
category = Custom
disabled = false
pulldown_type = true

0 Karma

micahkemp
Champion

You also need WRITE_META = true in your transform.

Also make sure your regex has a capturing group. Your format line says to use the first capture group as the field value.

0 Karma

rvinil
New Member

Hi Micahkemp,

Used the write_meta = true. Its working in my PC, when i used the same ".conf's" in office not able to get the data. Please suggest...

0 Karma

micahkemp
Champion

Which instance did you install this configuration on? It needs to go on the heavy forwarders and indexers.

0 Karma
Get Updates on the Splunk Community!

See just what you’ve been missing | Observability tracks at Splunk University

Looking to sharpen your observability skills so you can better understand how to collect and analyze data from ...

Weezer at .conf25? Say it ain’t so!

Hello Splunkers, The countdown to .conf25 is on-and we've just turned up the volume! We're thrilled to ...

How SC4S Makes Suricata Logs Ingestion Simple

Network security monitoring has become increasingly critical for organizations of all sizes. Splunk has ...