<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: REGEX filter in transforms.conf file setting question in Splunk Enterprise</title>
    <link>https://community.splunk.com/t5/Splunk-Enterprise/REGEX-filter-in-transforms-conf-file-setting-question/m-p/298369#M7036</link>
    <description>&lt;P&gt;I'm sorry, the limits of my Splunk knowledge is being hit by your question.  I don't know how to query Splunk to see the output of the data stream  to the 3rd party.  I'm looking at 3rd party tool itself and looking at the data coming in.  By looking at that data, I can see the computer names that are being matched.  The pattern I've discerned is what I've posted before about the computer names.  Those with letters and numbers are fine.  Anything with something else in it doesn't reach the 3rd party.&lt;/P&gt;

&lt;P&gt;Is there a way I can write a query to see the output to compare and provide the data you're looking for ?&lt;/P&gt;

&lt;P&gt;(and thank you for your patience with me on this question)&lt;/P&gt;</description>
    <pubDate>Tue, 09 Jan 2018 16:03:22 GMT</pubDate>
    <dc:creator>erictodor</dc:creator>
    <dc:date>2018-01-09T16:03:22Z</dc:date>
    <item>
      <title>REGEX filter in transforms.conf file setting question</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise/REGEX-filter-in-transforms-conf-file-setting-question/m-p/298357#M7024</link>
      <description>&lt;P&gt;We're forwarding events to a 3rd party.  In our transforms.conf file, the filter looks like the following &lt;/P&gt;

&lt;P&gt;&lt;STRONG&gt;REGEX = .&lt;/STRONG&gt;&lt;/P&gt;

&lt;P&gt;For some reason, this filter capture names without any hyphens.  Here's what I'm talking about&lt;/P&gt;

&lt;P&gt;Success - Computer&lt;BR /&gt;
Failure - Co-m-puter&lt;/P&gt;

&lt;P&gt;We have computer names with the '-' in them but they don't get captured.  Is there a better wild card string that can be used to capture all computer names, regardless of what characters are in them.&lt;/P&gt;

&lt;P&gt;Thanks!&lt;/P&gt;</description>
      <pubDate>Mon, 08 Jan 2018 22:07:20 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise/REGEX-filter-in-transforms-conf-file-setting-question/m-p/298357#M7024</guid>
      <dc:creator>erictodor</dc:creator>
      <dc:date>2018-01-08T22:07:20Z</dc:date>
    </item>
    <item>
      <title>Re: REGEX filter in transforms.conf file setting question</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise/REGEX-filter-in-transforms-conf-file-setting-question/m-p/298358#M7025</link>
      <description>&lt;P&gt;&lt;CODE&gt;REGEX = .&lt;/CODE&gt; isn't capturing names at all.  It's not capturing anything, and it matches anything.  I think you're looking at the wrong transform.&lt;/P&gt;</description>
      <pubDate>Mon, 08 Jan 2018 22:13:34 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise/REGEX-filter-in-transforms-conf-file-setting-question/m-p/298358#M7025</guid>
      <dc:creator>micahkemp</dc:creator>
      <dc:date>2018-01-08T22:13:34Z</dc:date>
    </item>
    <item>
      <title>Re: REGEX filter in transforms.conf file setting question</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise/REGEX-filter-in-transforms-conf-file-setting-question/m-p/298359#M7026</link>
      <description>&lt;P&gt;If you share some sample data and your transforms.conf settings we can help better.&lt;/P&gt;</description>
      <pubDate>Mon, 08 Jan 2018 22:28:30 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise/REGEX-filter-in-transforms-conf-file-setting-question/m-p/298359#M7026</guid>
      <dc:creator>richgalloway</dc:creator>
      <dc:date>2018-01-08T22:28:30Z</dc:date>
    </item>
    <item>
      <title>Re: REGEX filter in transforms.conf file setting question</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise/REGEX-filter-in-transforms-conf-file-setting-question/m-p/298360#M7027</link>
      <description>&lt;P&gt;Here's some additional info.  Let me know if this is helpful. &lt;/P&gt;

&lt;P&gt;Thank you&lt;/P&gt;

&lt;P&gt;&lt;STRONG&gt;Props.conf&lt;/STRONG&gt;&lt;/P&gt;

&lt;P&gt;[host::*]&lt;BR /&gt;
TRANSFORMS-main = test_eventlogs&lt;/P&gt;

&lt;P&gt;&lt;STRONG&gt;Transforms.conf&lt;/STRONG&gt;&lt;/P&gt;

&lt;P&gt;[test_eventlogs]&lt;BR /&gt;
REGEX = .&lt;BR /&gt;
DEST_KEY = _SYSLOG_ROUTING&lt;BR /&gt;
FORMAT = windowsworkstationsmain&lt;/P&gt;

&lt;P&gt;&lt;STRONG&gt;Outputs.conf&lt;/STRONG&gt;&lt;/P&gt;

&lt;P&gt;[syslog:windowsworkstationsmain]&lt;BR /&gt;
server = my.destination.com&lt;BR /&gt;
sendCookedData = true&lt;/P&gt;</description>
      <pubDate>Tue, 29 Sep 2020 17:35:07 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise/REGEX-filter-in-transforms-conf-file-setting-question/m-p/298360#M7027</guid>
      <dc:creator>erictodor</dc:creator>
      <dc:date>2020-09-29T17:35:07Z</dc:date>
    </item>
    <item>
      <title>Re: REGEX filter in transforms.conf file setting question</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise/REGEX-filter-in-transforms-conf-file-setting-question/m-p/298361#M7028</link>
      <description>&lt;P&gt;That configuration tells Splunk where to send the data (in this case by syslog to my.destination.com).  That is uninvolved in the parsing of the data.&lt;/P&gt;

&lt;P&gt;Can you include &lt;CODE&gt;props.conf&lt;/CODE&gt; (from the search head, not the forwarder) for the sourcetype in question?&lt;/P&gt;</description>
      <pubDate>Mon, 08 Jan 2018 22:40:22 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise/REGEX-filter-in-transforms-conf-file-setting-question/m-p/298361#M7028</guid>
      <dc:creator>micahkemp</dc:creator>
      <dc:date>2018-01-08T22:40:22Z</dc:date>
    </item>
    <item>
      <title>Re: REGEX filter in transforms.conf file setting question</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise/REGEX-filter-in-transforms-conf-file-setting-question/m-p/298362#M7029</link>
      <description>&lt;P&gt;This is from the search head.  &lt;/P&gt;</description>
      <pubDate>Mon, 08 Jan 2018 22:47:31 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise/REGEX-filter-in-transforms-conf-file-setting-question/m-p/298362#M7029</guid>
      <dc:creator>erictodor</dc:creator>
      <dc:date>2018-01-08T22:47:31Z</dc:date>
    </item>
    <item>
      <title>Re: REGEX filter in transforms.conf file setting question</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise/REGEX-filter-in-transforms-conf-file-setting-question/m-p/298363#M7030</link>
      <description>&lt;P&gt;This is the complete props.conf&lt;/P&gt;

&lt;P&gt;[set_sourcetype_to_stash]&lt;BR /&gt;
REGEX    = .&lt;BR /&gt;
DEST_KEY = MetaData:Sourcetype&lt;BR /&gt;
FORMAT   = sourcetype::stash&lt;/P&gt;

&lt;P&gt;[extract_spent]&lt;BR /&gt;
REGEX   = (?P\d+)ms$&lt;/P&gt;

&lt;P&gt;[eliminate-eventcodes]&lt;BR /&gt;
REGEX = EventCode=(0000)&lt;BR /&gt;
DEST_KEY = queue&lt;BR /&gt;
FORMAT = nullQueue&lt;/P&gt;

&lt;P&gt;[wstn_eventlogs]&lt;BR /&gt;
REGEX = .&lt;BR /&gt;
DEST_KEY = _SYSLOG_ROUTING&lt;BR /&gt;
FORMAT = windowsworkstationsmain&lt;/P&gt;</description>
      <pubDate>Tue, 29 Sep 2020 17:35:12 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise/REGEX-filter-in-transforms-conf-file-setting-question/m-p/298363#M7030</guid>
      <dc:creator>erictodor</dc:creator>
      <dc:date>2020-09-29T17:35:12Z</dc:date>
    </item>
    <item>
      <title>Re: REGEX filter in transforms.conf file setting question</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise/REGEX-filter-in-transforms-conf-file-setting-question/m-p/298364#M7031</link>
      <description>&lt;P&gt;The REGEX string "." matches any single character, which is probably not what you want.&lt;BR /&gt;
If you share some sample data and let us know what you want extracted from it we can probably help create a working regex.&lt;/P&gt;</description>
      <pubDate>Tue, 09 Jan 2018 12:54:28 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise/REGEX-filter-in-transforms-conf-file-setting-question/m-p/298364#M7031</guid>
      <dc:creator>richgalloway</dc:creator>
      <dc:date>2018-01-09T12:54:28Z</dc:date>
    </item>
    <item>
      <title>Re: REGEX filter in transforms.conf file setting question</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise/REGEX-filter-in-transforms-conf-file-setting-question/m-p/298365#M7032</link>
      <description>&lt;P&gt;Basically, we have computer names that are whole words without any non-characters in the name (i.e. Computer01) and we have names with non-characters in them (i.e. Computer-01).  It looks like the filter only matches the 1st, names with only characters and numbers.  I need to capture all names, including the ones with '-' in them.&lt;/P&gt;

&lt;P&gt;Any help would be appreciated.&lt;/P&gt;</description>
      <pubDate>Tue, 09 Jan 2018 15:11:04 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise/REGEX-filter-in-transforms-conf-file-setting-question/m-p/298365#M7032</guid>
      <dc:creator>erictodor</dc:creator>
      <dc:date>2018-01-09T15:11:04Z</dc:date>
    </item>
    <item>
      <title>Re: REGEX filter in transforms.conf file setting question</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise/REGEX-filter-in-transforms-conf-file-setting-question/m-p/298366#M7033</link>
      <description>&lt;P&gt;The issue is we still haven't seen the regex that is matching computer names.  None of the transforms you posted above show that extraction.&lt;/P&gt;

&lt;P&gt;Can you show the props.conf configuration for the sourcetype of this data that is being improperly extracted?&lt;/P&gt;</description>
      <pubDate>Tue, 09 Jan 2018 15:23:00 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise/REGEX-filter-in-transforms-conf-file-setting-question/m-p/298366#M7033</guid>
      <dc:creator>micahkemp</dc:creator>
      <dc:date>2018-01-09T15:23:00Z</dc:date>
    </item>
    <item>
      <title>Re: REGEX filter in transforms.conf file setting question</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise/REGEX-filter-in-transforms-conf-file-setting-question/m-p/298367#M7034</link>
      <description>&lt;P&gt;This is what I have.  I'm assuming the text below represents the computer name filter.&lt;/P&gt;

&lt;P&gt;--Eric&lt;/P&gt;

&lt;P&gt;[WinEventLog:Security]&lt;BR /&gt;
TRANSFORMS-t1 = eliminate-eventcodes&lt;/P&gt;

&lt;P&gt;[CSC_FileMon]&lt;BR /&gt;
DATETIME_CONFIG = CURRENT&lt;BR /&gt;
NO_BINARY_CHECK = 1&lt;BR /&gt;
SHOULD_LINEMERGE = false&lt;BR /&gt;
pulldown_type = 1&lt;/P&gt;

&lt;P&gt;[host::*]&lt;BR /&gt;
TRANSFORMS-main = wstn_eventlogs&lt;/P&gt;</description>
      <pubDate>Tue, 29 Sep 2020 17:35:35 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise/REGEX-filter-in-transforms-conf-file-setting-question/m-p/298367#M7034</guid>
      <dc:creator>erictodor</dc:creator>
      <dc:date>2020-09-29T17:35:35Z</dc:date>
    </item>
    <item>
      <title>Re: REGEX filter in transforms.conf file setting question</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise/REGEX-filter-in-transforms-conf-file-setting-question/m-p/298368#M7035</link>
      <description>&lt;P&gt;When you search that data in Splunk, what does it show is the sourcetype for the events with the mis-parsed computer name?  If it's &lt;CODE&gt;CSC_FileMon&lt;/CODE&gt; then the above shows the props for it, but there is no extraction defined, which means Splunk may be grabbing the computer name via &lt;CODE&gt;KV_MODE = auto&lt;/CODE&gt; (which looks for key=value in the events).&lt;/P&gt;

&lt;P&gt;Please include some sample events that have computer name, both where it is properly extracted and where it is not.&lt;/P&gt;</description>
      <pubDate>Tue, 09 Jan 2018 15:50:51 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise/REGEX-filter-in-transforms-conf-file-setting-question/m-p/298368#M7035</guid>
      <dc:creator>micahkemp</dc:creator>
      <dc:date>2018-01-09T15:50:51Z</dc:date>
    </item>
    <item>
      <title>Re: REGEX filter in transforms.conf file setting question</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise/REGEX-filter-in-transforms-conf-file-setting-question/m-p/298369#M7036</link>
      <description>&lt;P&gt;I'm sorry, the limits of my Splunk knowledge is being hit by your question.  I don't know how to query Splunk to see the output of the data stream  to the 3rd party.  I'm looking at 3rd party tool itself and looking at the data coming in.  By looking at that data, I can see the computer names that are being matched.  The pattern I've discerned is what I've posted before about the computer names.  Those with letters and numbers are fine.  Anything with something else in it doesn't reach the 3rd party.&lt;/P&gt;

&lt;P&gt;Is there a way I can write a query to see the output to compare and provide the data you're looking for ?&lt;/P&gt;

&lt;P&gt;(and thank you for your patience with me on this question)&lt;/P&gt;</description>
      <pubDate>Tue, 09 Jan 2018 16:03:22 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise/REGEX-filter-in-transforms-conf-file-setting-question/m-p/298369#M7036</guid>
      <dc:creator>erictodor</dc:creator>
      <dc:date>2018-01-09T16:03:22Z</dc:date>
    </item>
    <item>
      <title>Re: REGEX filter in transforms.conf file setting question</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise/REGEX-filter-in-transforms-conf-file-setting-question/m-p/298370#M7037</link>
      <description>&lt;P&gt;So the question here is why is a 3rd party tool not parsing the logs correctly?&lt;/P&gt;

&lt;P&gt;Your config above looks correct to forward logs, and doesn't do any other parsing or formatting.  If a 3rd party tool isn't parsing as you'd expect that sounds like an issue with that other tool.&lt;/P&gt;</description>
      <pubDate>Tue, 09 Jan 2018 16:05:40 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise/REGEX-filter-in-transforms-conf-file-setting-question/m-p/298370#M7037</guid>
      <dc:creator>micahkemp</dc:creator>
      <dc:date>2018-01-09T16:05:40Z</dc:date>
    </item>
    <item>
      <title>Re: REGEX filter in transforms.conf file setting question</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise/REGEX-filter-in-transforms-conf-file-setting-question/m-p/298371#M7038</link>
      <description>&lt;P&gt;That's a possibility.  When I'm looking at the 3rd party feed, I'm assuming I'm looking at the feed before it's parsed and when I look at the raw data, I don't see all computer names.  Is there a way to mimic this props.conf filter in a Splunk query so I can see what is being captured?&lt;/P&gt;

&lt;P&gt;I guess the question is, IS Splunk sending entries from all hosts or is it sending a sub-set of hosts?  I can't verify this from the Splunk side (yet?).  If I can  verify that it is, I can then focus on the 3rd party for not parsing the entries correctly but right now I don't know if the data out is good.&lt;/P&gt;

&lt;P&gt;I hope that makes sense.&lt;/P&gt;</description>
      <pubDate>Tue, 09 Jan 2018 16:13:51 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise/REGEX-filter-in-transforms-conf-file-setting-question/m-p/298371#M7038</guid>
      <dc:creator>erictodor</dc:creator>
      <dc:date>2018-01-09T16:13:51Z</dc:date>
    </item>
    <item>
      <title>Re: REGEX filter in transforms.conf file setting question</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise/REGEX-filter-in-transforms-conf-file-setting-question/m-p/298372#M7039</link>
      <description>&lt;P&gt;Splunk's concept of &lt;CODE&gt;host&lt;/CODE&gt; is the machine that created or sent the logs.  Your configuration tells Splunk to forward all of those hosts' logs to this other tool.&lt;/P&gt;

&lt;P&gt;The other concept of host you appear to be using is the computer name referenced in the log, and there is no pattern matching against that based on what you have posted from your configs.  The &lt;CODE&gt;REGEX = .&lt;/CODE&gt; line means "match everything, seriously."&lt;/P&gt;</description>
      <pubDate>Tue, 09 Jan 2018 16:17:42 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise/REGEX-filter-in-transforms-conf-file-setting-question/m-p/298372#M7039</guid>
      <dc:creator>micahkemp</dc:creator>
      <dc:date>2018-01-09T16:17:42Z</dc:date>
    </item>
    <item>
      <title>Re: REGEX filter in transforms.conf file setting question</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise/REGEX-filter-in-transforms-conf-file-setting-question/m-p/298373#M7040</link>
      <description>&lt;P&gt;Thank you for the distinction in definitions.  Helps with explaining the issue more.  This configuration is what we want Splunk to do.  To forward all logs to our 3rd party.  In these logs are computer names (my definition of  host I was using).  While the &lt;EM&gt;REGEX = .&lt;/EM&gt; means match everything, is there any way to double verify that everything, is indeed, being forwarded?&lt;/P&gt;</description>
      <pubDate>Tue, 09 Jan 2018 16:27:21 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise/REGEX-filter-in-transforms-conf-file-setting-question/m-p/298373#M7040</guid>
      <dc:creator>erictodor</dc:creator>
      <dc:date>2018-01-09T16:27:21Z</dc:date>
    </item>
  </channel>
</rss>

