

I restarted with splunk restart both server and universal forwarder, and the only thing that changed is that it started to put sourcetype=output-2 on my events. Then, I started googling around, and reading some docs, they tell to edit some files on splunk server then I did:ģ - Also tried creating a new sourcetype on $SPUNK_HOME/etc/system/local/nf as follow: Ĥ - Also changed my $SPUNK_HOME/etc/system/local/nf, and added: I check on Search->Event lists and my logs are being sourcetyped as output-too_small, now I changed something and it is output-2 What I'm doing wrong?Ģ - It doesn't apply my new sourcetype to my logs. If I go on "Events Break" instead and just type my regex it saves. But I noticed two weird things.ġ - If I go on Advanced and configure as I want, It don't save my new regex for LINE_BREAKER. I tried creating a new sourcetype on Settings->Data->Source Types. I'm trying to configure some sourcetype for my python/flask application, logs where getting merged incorrectly, with two or more line logs being joined inside a single event and sourcetype is not being applied.įor example, this is a single event in splunk: INFO - Host: localhost:5000 I'm using Splunk Enterprise (Trial) to understand how things works. nf # Just like sourcetype name implies.Hi everyone. # This is the port created for the loopback # This is the input to the original data source

#Splunk props conf free
I hope this tip was helpful and obviously feel free to drop any question in the comments. Then the IDS sourcetype stanza in the nf will do its thing and problem solved ! the forwarder itself,listening on another port. The basic ideas is to have those IDS event, after being assigned with the proper sourcetype, go through the syslog routing where the server is. So here is the solution I've found to create a loopback that will make the IDS events go back through the pipeline and have the time zone properly adjusted. Just adding the new IDS sourcetype stanza in nf wouldn't work because normally splunk goes once through the pipeline and wouldn't get back to the Typing pipeline after first changing the sourcetype key to the IDS key.

However in this case, to make things worse, the events included a unique IDS log with a different time zone than my locale and without any identification in the time stamp so the splunk time interpreter took the time as it is without adjusting it to UTC.

A fairly standard procedure up to this point. Recently I had to improve the data quality of a source that is feeding my splunk instance with various security events over a single port.Ī major part of the process I'm usually following is breaking the events into different source types using regex. Conf20 session was already recorded, you might want to consider the below as an addendum since it is inline with the session topic and the motivation to spend hours finding a solution stem from the same problem statement: What to do if you have very little or no control over the data source ?
