Manage source types
Create, edit, and delete source types on the Source Types page. To get to the Source Types page in Splunk Web, go to Settings > Source types. While this page and the Set Source Type page have similar names, the pages offer different functions.
The Source Types page displays all source types that have been configured on a instance. It shows the default source types provided by your deployment and any source types that you added.
Sort source types
By default, the Source Types page sorts source types alphabetically. You can change how the page sorts by clicking the header bar for the Name, Category, and App columns.
Each header bar, except for Actions, acts as a toggle. Click once to sort in ascending order and click again to sort in descending order.
Filter source types
You can filter the number of source types you see on the Source Type page.
Filter by commonality
To see only the most common source types, click the Show only popular checkbox along the top of the page. Popular source types are the most common source types. They have a
pulldown_type source type field value of 1. When the Show only popular checkbox is not selected, the page shows all source types that are defined on the instance.
Filter by category
To see only source types that belong to a certain category, click the Category drop-down list and select the category you want. Only source types that belong to that category will display. To see all source types again, select All from the Category drop-down list.
Filter by application context
To see only source types that belong in a certain application context, click the App drop-down list and select the application context that the source type applies to. Only source types that apply to that application context will display. To see all source types again, select All from the App drop-down list.
Filter by string
To see only source types whose names contain a certain string, type that string in the Filter text box next to the App drop-down list, then press Enter. Only source types whose names or descriptions match what you have typed in the Filter box display. To see all source types again, click the x button on the right side of the Filter text box.
By default, the Source Types management page shows up to 20 source types on a page. If you want to see more or less, click 20 per page on the right side of the page and select the number of source types you want to see. Choices are 10, 20, 50, or 100 listings on a page.
Modify source types
To modify a source type, click its name in the list, or click Edit in the Actions column. The Edit Source type page appears.
The Edit Source Type dialog box lets you change the configuration of a source type. You can change the following fields:
|Description||The description of the source type.|
|Destination app||The application context that the source type applies to. |
You cannot change the app destination for source types that come with Splunk software.
|Category||The category that the source type is a member of. Click the button to select from the list of categories and choose the one you want. When you save, the source type appears in the category you selected. |
The Log to Metrics source type category is used specifically for converting log events to metric data points. See About the Log to Metrics source type category later in this topic.
|Indexed Extractions||A format for extracting fields at index time from files with structured data. Select the type of indexed extraction that best represents the contents of the file:
|Timestamp||How timestamps are determined for events from the source file. See the Timestamp section later in this topic.|
|Advanced||Shows all of the configurations for the source type in key/value format. See the Advanced section later in this topic.|
The Timestamp section of the dialog box controls how timestamps are determined for events from the source file. You can choose the following options:
- Auto: Use default logic to extract timestamp from event.
- Current Time: Use current system time.
- Advanced: Use advanced internal logic to extract timestamp from event.
The following advanced configurations are available when you select Advanced in the Timestamp Extraction section:
- Time zone: Specify the time zone to be assigned to the timestamps.
- Timestamp format: Specify the format of the timestamp in the source event. The available formats come from the properties of the
For example, suppose the source file contains logs with timestamps in this format:
6 Jun 2015 18:35:05
Then, you might specify the following in the Timestamp format field:
%d %b %Y %H:%M:%S
Consider the following example:
Tue Jun 4 2:55:18 PM 2015
If the source file contains logs with timestamps in that format, specify the following in the Timestamp format field:
%a %b %d %I:%M:%S %p %Y
For a list of the strings that you can use to define the timestamp format, see strptime(3) at https://linux.die.net/man/3/strptime on the die.net Linux site.
Timestamp prefix: A regular expression that represents the characters that come before a timestamp. When sees this set of characters in an event, it expects a timestamp to occur after that.
Lookahead: Specifies the maximum number of characters to scan into an event for the timestamp. If you specify a regular expression in the Timestamp prefix field, it looks no more than the number of characters specified past the string that the regular expression represents for the timestamp.
The Advanced section shows you all of the configurations for the source type in key/value format. This represents what is in the props.conf configuration file that defines the source type. You can edit each setting directly, or add and delete settings.
Use the Advanced section with care. Adding or changing values here can cause data to be incorrectly indexed.
To delete settings, click the x on the right side of each setting. To add an entry, click New setting at the bottom of the dialog box to expose a key/value pair of fields. Enter the key name in the Name field and its value in the Value field.
About the Log to Metrics source type category
The Log to Metrics source type category is used for the ingest-time conversion of logs to metric data points. If you select it, a Metrics tab appears. For more information about this source type and the fields in the Metrics tab, see Convert event logs to metric data points in Metrics.
Add a source type
To create a new source type:
- Click New Source Type. The Create Source Type dialog box opens.
- Specify a name for the new source type. Source type names do not support the following characters:
- Follow the same steps used to modify an existing source type to configure your new source type. See Modify source types earlier in this topic.
- Click Save.
Delete a source type
To delete a source type, click the Delete link in the Actions column for the source type that you want to delete. You can only delete a source type in Cloud if you are a Victoria Experience customer.
If you have a Splunk Cloud Platform instance and are unable to delete one of your user or app created source types, please contact Splunk Support for assistance. You cannot delete the source types built-in to Splunk Enterprise.
When you delete a source type, the following dialog appears:
Deleting a source type has significant consequences, especially if the source type is already in use:
- Data can be indexed incorrectly after you delete the source type. Making the data searchable in the way you want later can take a lot of effort. Many apps and add-ons use source types to look for data, and data indexed under a missing source type is data those apps and add-ons do not see.
- Any configurations that the source type uses, such as field extractions, index time filtering, and timestamp formats, are irretrievably lost.
- You cannot undo a source type deletion. The only options available in this case are to restore the
props.conffile that defines the source type from a backup, or recreate the source type manually.
If you are sure you want to delete the source type, click Delete.
The dialog box closes, and Splunk Web returns you to the Source Types management page.
Create source types
Rename source types at search time
This documentation applies to the following versions of Splunk Cloud Platform™: 9.0.2208, 8.2.2105, 8.2.2106, 8.2.2109, 8.2.2111, 8.2.2112, 8.2.2201, 8.2.2202, 8.2.2203 (latest FedRAMP release), 9.0.2205, 8.2.2107, 8.1.2103