Adding Splunk Metadata to events
Answers
-
Hi @Tike Awe ,
What did you try so far?
Usually you would just add an Eval Function to a Pipeline and eval e.g.:
index → 'yourindexname'
Values need to be single quoted.
This would end up as a new field to the root of the event and as indexed field in Splunk.0