...moketest_json_dyn_tcp". Similar inputs are configured with unique sourcetype names; they are making REST calls to the same destination to collect different metrics. Since the same field names are being returned b...
...tatement like below in UI and its working fine but im not sure how to deploy this in props.conf
index=index_name sourcetype=sourctype_name log_level=NOTICE
|eval message =case(method_name='p...
Hi All, Having an issue trying to route events to an index by source, posting as a new question as I've not found anything that's helped me understand how /where to configure this. We have events b...
...alculate this timestamp difference using strptime("alert.created_at") but the conversion of that time to epoch is relative to the viewers timezone. The duration changes based on how you configure t...
...plunk App Add-on Builder
pulldown_type = 1
# Fields Aliases
...
Anyone has an idea about where those duplicate values come from ?
Thanks for your help
We have the following -
logTime 2016-04-06 06:12:32,251 UTC
eventStartTime 2016-04-06 01:12:32.177
_time 2016-04-06T01:12:32.251-05:00
Is it possible to set the _time field to have t...
...s are not usable with lookup, but...
The props.conf documentation says something else:
"Splunk processes calculated fields after field extraction and fieldaliasing but before lookups"
...he logs.
Here are the example for each:
test@test.com
3234-1234-5678-5678
As I need to configureprops.conf and transforms.conf under $SPLUNK_HOME/etc/system/local/
Specifically, in props...
...t; i should do that in Search head and configureprops.conf and transforms.conf
i just found those 2 articles but i still confused.
https://docs.splunk.com/Documentation/Splunk/7.2.6/Admin/Configur...
...earch head, it seemed not to be able to communicate with the rest of our infrastructure.
After debugging the logfiles we found out that some of our defined FIELDALIAS'es in the props.conf on one of o...