About event types
Event types are a categorization system to help you make sense of your data. Event types let you sift through huge amounts of data, find similar patterns, and create alerts and reports.
Events versus event types
An event is a single record of activity within a log file. An event typically includes a timestamp and provides information about what occurred on the system being monitored or logged.
An event type is a user-defined field that simplifies search by letting you categorize events. Event types let you classify events that have common characteristics. When your search results come back, they're checked against known event types. An event type is applied to an event at search time if that event matches the event type definition in eventtypes.conf. Tag or save event types after indexing your data.
Event type classification
There are several ways to create your own event types. Define event types via Splunk Web or through configuration files, or you can save any search as an event type. When saving a search as an event type, you may want to use the
punct field to craft your searches. The
punct field helps you narrow down searches based on the structure of the event.
Use the punct field to search on similar events
Because the format of an event is often unique to an event type, Splunk indexes the punctuation characters of events as a field called
punct field stores the first 30 punctuation characters in the first line of the event. This field is useful for finding similar events quickly.
When you use
punct, keep in mind:
- Quotes and backslashes are escaped.
- Spaces are replaced with an underscore (_).
- Tabs are replaced with a "t".
- Dashes that follow alphanumeric characters are ignored.
- Interesting punctuation characters are:
- The punct field is not available for events in the _audit index because those events are signed using PKI at the time they are generated.
For an introduction to the punct field and other methods of event classification, see "Classify and group similar events" topic in this manual.
####<Jun 3, 2005 5:38:22 PM MDT> <Notice> <WebLogicServer> <bea03> <asiAdminServer> <WrapperStartStopAppMain> <>WLS Kernel<> <> <BEA-000360> <Server started in RUNNING mode>
Produces this punctuation:
172.26.34.223 - - [01/Jul/2005:12:05:27 -0700] "GET /trade/app?action=logout HTTP/1.1" 200 2953
Produces this punctuation:
Event type discovery
Pipe any search to the typelearner command and create event types directly from Splunk Web. The file eventdiscoverer.conf is mostly deprecated, although you can still specify terms to ignore when learning new event types in Splunk Web.
Create new event types
The simplest way to create a new event type is through Splunk Web. Save an event type much in the same way you save a search. For more information, see "Define and maintain event types in Splunk Web" in this manual.
Create new event types by modifying
eventtypes.conf. For more about saving searches as event types, see the "Classify and group similar events" topic in this manual.
Tag event types to organize your data into categories. There can be multiple tags per event. For more information about event type tagging, see the "Tag event types" topic in this manual
Configuration files for event types
Event types are stored in eventtypes.conf.
Terms for event type discovery are set in eventdiscoverer.conf.
About Splunk Enterprise regular expressions
Define and maintain event types in Splunk Web
This documentation applies to the following versions of Splunk® Enterprise: 5.0, 5.0.1, 5.0.2, 5.0.3, 5.0.4, 5.0.5, 5.0.6, 5.0.7, 5.0.8, 5.0.9, 5.0.10, 5.0.11, 5.0.12, 5.0.13, 5.0.14, 5.0.15, 5.0.16, 5.0.17, 5.0.18