Here are some useful references: Get data from TCP and UDP ports - Splunk Documentation Create custom indexes - Splunk Documentation Note the section in the first link, copied below, where it says that you have to define the inputs stanza attributes so that the data ingested is properly indexed. For the second link, the "Create Event Indexes" section might be orienting for you. ================== Configure a UDP network input This type of input stanza is similar to the TCP type, except that it listens on a UDP network port. If you provide <remote server>, the port that you specify only accepts data from that host. If you don't specify anything for <remote server>, the port accepts data that comes from any host. [udp://<remote server>:<port>]
<attrbute1> = <val1>
<attrbute2> = <val2>
... The following settings control how the Splunk platform stores the data: Setting Description Default host = <string> Sets the host field to a static value for this stanza. Also sets the host key initial value. Splunk Cloud Platform uses this key during parsing and indexing, in particular to set the host field. It also uses the host field at search time. The <string> is prepended with host::. The IP address or fully-qualified domain name of the host where the data originated. index = <string> Sets the index where Splunk Cloud Platform stores events from this input. The <string> is prepended with index::. main or whatever you set the default index to sourcetype = <string> Sets the sourcetype field for events from this input. Also declares the source type for this data, as opposed to letting Splunk Cloud Platform determine it. This is important both for searchability and for applying the relevant formatting for this type of data during parsing and indexing. Sets the sourcetype key initial value. Splunk Cloud Platform uses the key during parsing and indexing, in particular to set the source type field during indexing. It also uses the source type field that it used at search time. The <string> is prepended with sourcetype::. Splunk Cloud Platform picks a source type based on various aspects of the data. There is no hard-coded default. source = <string> Sets the source field for events from this input. The <string> is prepended with source::. Do not override the source key unless absolutely necessary. The input layer provides a more accurate string to aid in problem analysis and investigation by recording the file from which the data is retrieved. Consider use of source types, tagging, and search wildcards before overriding this value. The input file path. indexQueue Sets where the input processor deposits the events that it reads. Set to parsingQueue to apply the props.conf file and other parsing rules to your data. Set to indexQueue to send your data directly into the index. parsingQueue _rcvbuf = <integer> Sets the receive buffer for the UDP port, in bytes. If the value is 0 or negative, Splunk Cloud Platform ignores the value. 1,572,864 unless the value is too large for an OS. In this case, Splunk Cloud Platform halves the value from this default continuously until the buffer size is at an acceptable level. no_priority_stripping = true | false Sets how Splunk Enterprise handles receiving syslog data. If you set this setting to true, Splunk Cloud Platform does not strip the <priority> syslog field from received events. Depending on how you set this setting, Splunk Cloud Platform also sets event timestamps differently. When set to true, Splunk Cloud Platform honors the timestamp as it comes from the source. When set to false, Splunk Enterprise assigns events the local time. false (Splunk Cloud Platform strips <priority>.) no_appending_timestamp = true | false Sets how Splunk Cloud Platform applies timestamps and hosts to events. If you set this setting to true, Splunk Cloud Platform does not append a timestamp and host to received events. Do not configure this setting if you want to append timestamp and host to received events. false (Splunk Cloud Platform appends timestamps and hosts to events) @jmrubio
... View more