For Step 2 - how would I exactly configure this? What would I put into the fields based on the logs above?
*The Splunk App for Web Analytics works in a multi website environment. Websites are configured from a combination of the host and the source field. Each event with that unique combination will be tagged with the corresponding website name in the field "site". You can use wildcards () in the Source and Host field to select multiple files matching a pattern. There is a website setup form page that allows you to add these in an easy way.
Here are some examples of valid website configurations with or without wildcards
Site Host Source
roadrunner.com server1 /var/log/httpd/access_log
roadrunner.com server2 /var/log/httpd/access_log
Site Host Source
roadrunner.com server /var/log/httpd/access_*
The correct configuration in the sites lookup would be Site Host Source
mywebsite.com HOSTNAME d:\iislogs\W3SVC3\logfilename.log
However, as you have the sourcetype set to CSIIS the app will not work out of the box. Look in the documentation under the very first paragraph:
1. Import web server log data
The Splunk App for Web Analytics currently supports data from Apache and IIS logs. Make sure you use the sourcetype access_common, access_combined or **iis* for this data. If you already have data in Splunk under a different sourcetype you can use sourcetype renaming or by modifying the eventtype web-traffic to include the names of your sourcetypes.*
In the actual documentation page there is links directly to the settings that needs to be modified to use a different sourcetype. I recommend the sourcetype renaming approach.