I'm trying to configure Splunk to properly parse the fields of the W3C log format.
Now, I'm running into configuration confusion: where and how do I specify how to split up the log format?
My Inputs.conf looks like this:
[monitor://C:\WINDOWS\system32\LogFiles\W3SVC98989898]
disabled = false
host = mywebsite.net
sourcetype = iis
I tried adding this to my sourcetypes.conf:
[iis_w3c_default]
DELIMS = " "
FIELDS = "date", "time", "cs-method", "cs-uri-stem", "cs-uri-query", "cs-username", "c-ip", "cs-version", "cs(User-Agent)", "cs(Referer)", "sc-status", "sc-bytes"
But using ths as a sourcetype failed to extract any meaningful fields.
I guess I just don't grasp everything that Splunk is doing...
Once i have this working, I plan on reindexing all of my data with the new fields (which will be an ordeal in-and-of-itself).
I really, really want to like Splunk but configuration is just too wonky...
You can filter the lines beginning with a # using a transform.
In props.conf (you can just add the extra line below your existing setup):
In transforms.conf:
Here is what I did:
etc\system\local\props.conf:
etc\system\local\transforms.conf:
Will update once I figure out how to remove lines that have a "#" symbol in them.