Create source types
You can create new source types in two ways:
- Use data preview in Splunk Web
- Edit the
props.confconfiguration file directly
Use data preview
Data preview provides an easy way to view the effects of applying a source type to your data and to make adjustments to the source type settings as necessary. You can save your changes as a new source type, which you can then assign to data inputs.
Data preview includes a UI for making the most common types of adjustments to timestamps and event breaks. For other modifications, it lets you edit the underlying
props.conf file directly. As you change settings, you can immediately see the changes to the event data.
To learn more about data preview, read the topics in the chapter "Preview your data" in this manual.
You can create a new source type by editing
props.conf and adding a new stanza. For detailed information on
props.conf, read the props.conf specification in the Admin manual.
props.conf file in
$SPLUNK_HOME/etc/system/local/ or in your own custom application directory in
$SPLUNK_HOME/etc/apps/. For information on configuration files in general, see "About configuration files" in the Admin manual.
You can also create a new
props.conf source type stanza directly from the Advanced mode tab in data preview. See the Advanced mode section in "Modify event processing" for details.
When you create a source type, you tell Splunk Enterprise how to process the data to create searchable events. In particular, there are two key things that you need to specify:
- Event breaks. To learn how to use
props.confto specify event breaks, see "Configure event linebreaking".
- Timestamps. To learn how to use
props.confto specify timestamps, see "Configure timestamp recognition", as well as other topics in the "Configure timestamps" chapter of this manual.
There are also a number of miscellaneous settings you can configure. See the props.conf specification for more information.
Override source types on a per-event basis
Rename source types at search time
This documentation applies to the following versions of Splunk® Enterprise: 6.0, 6.0.1, 6.0.2, 6.0.3, 6.0.4, 6.0.5, 6.0.6, 6.0.7, 6.0.8, 6.0.9, 6.0.10, 6.0.11, 6.0.12, 6.0.13, 6.0.14, 6.0.15, 6.1, 6.1.1, 6.1.2, 6.1.3, 6.1.4, 6.1.5, 6.1.6, 6.1.7, 6.1.8, 6.1.9, 6.1.10, 6.1.11, 6.1.12, 6.1.13, 6.1.14