We have updated our Terms of Service, Code of Conduct, and Addendum.

New index time fields from a syslog

Options

Hello, small question about index time fields, if I want to create a new field with my logs coming from a syslog (eval function on my cribl), I have to put a fields.conf file on my splunk instance which declares all the new fields I will create from cribl ? example on fields.conf : [my_field] INDEXED=true [my_field2] INDEXED=true Is this the only prerequisite for not having an error during indexing? As for the fields.conf, do you have to put it on the SH and IDX also in a distributed environment?

Answers

  • Chad Lavine
    Options

    my goal is to redo what a TA does but in cribl, because I have a problem with the index time when I pass my syslog through cribl, the TA can't extract the fields I want correctly

  • xpac xpac
    xpac xpac Posts: 148 ✭✭✭
    Options

    So, you can send whatever index time fields you like to Splunk from Cribl, no fields.conf needed

  • xpac xpac
    xpac xpac Posts: 148 ✭✭✭
    Options

    However, without fields.conf on your SH, you will run in more or less problems during searches using those fields

  • xpac xpac
    xpac xpac Posts: 148 ✭✭✭
    Options

    So indexing is totally unrelated to fields.conf, but searching is not