<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: How to use props and transform.conf in splunk in Splunk Enterprise</title>
    <link>https://community.splunk.com/t5/Splunk-Enterprise/How-to-use-props-and-transform-conf-in-splunk/m-p/330866#M8188</link>
    <description>&lt;P&gt;What is the event from?  Have you tried using a TA that already has the extractions for the device?  Splunk TA Cisco for example if it's a Cisco device?  That's the easiest method.&lt;/P&gt;</description>
    <pubDate>Tue, 28 Feb 2017 10:45:00 GMT</pubDate>
    <dc:creator>jkat54</dc:creator>
    <dc:date>2017-02-28T10:45:00Z</dc:date>
    <item>
      <title>How to use props and transform.conf in splunk</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise/How-to-use-props-and-transform-conf-in-splunk/m-p/330865#M8187</link>
      <description>&lt;P&gt;Hi Experts,&lt;/P&gt;

&lt;P&gt;I am injecting below logs into splunk using file input. &lt;/P&gt;

&lt;P&gt;cs2Label=Original Category Outcome cs3Label=Original Device Product cs4Label=Internal Host cs5Label=Malicious IP Address&lt;/P&gt;

&lt;P&gt;After parsing into splunk I can see below output &lt;BR /&gt;
cs2Label=Original &lt;BR /&gt;
cs3Label=Original&lt;BR /&gt;
cs4Label=Internal&lt;BR /&gt;
 cs5Label=Malicious&lt;/P&gt;

&lt;P&gt;So from the output it is clear that it is ignoring string after first space . So I tried my own regex and place it in &lt;BR /&gt;
transform.conf&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;[abc]
REGEX = (([\w.:\[\]]+)=(.*?(?=(?:\s[\w.:\[\]]+=|$))))
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;props.conf&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;[cef]
TRANSFORMS-blah = abc
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;Still I can see string is missing in all the fields . Please suggest how I can achieve it using props and transform conf.&lt;/P&gt;

&lt;P&gt;Thanks&lt;BR /&gt;
VG&lt;/P&gt;</description>
      <pubDate>Tue, 28 Feb 2017 10:20:59 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise/How-to-use-props-and-transform-conf-in-splunk/m-p/330865#M8187</guid>
      <dc:creator>vikas_gopal</dc:creator>
      <dc:date>2017-02-28T10:20:59Z</dc:date>
    </item>
    <item>
      <title>Re: How to use props and transform.conf in splunk</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise/How-to-use-props-and-transform-conf-in-splunk/m-p/330866#M8188</link>
      <description>&lt;P&gt;What is the event from?  Have you tried using a TA that already has the extractions for the device?  Splunk TA Cisco for example if it's a Cisco device?  That's the easiest method.&lt;/P&gt;</description>
      <pubDate>Tue, 28 Feb 2017 10:45:00 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise/How-to-use-props-and-transform-conf-in-splunk/m-p/330866#M8188</guid>
      <dc:creator>jkat54</dc:creator>
      <dc:date>2017-02-28T10:45:00Z</dc:date>
    </item>
    <item>
      <title>Re: How to use props and transform.conf in splunk</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise/How-to-use-props-and-transform-conf-in-splunk/m-p/330867#M8189</link>
      <description>&lt;P&gt;&lt;A href="https://splunkbase.splunk.com/app/487/"&gt;https://splunkbase.splunk.com/app/487/&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 28 Feb 2017 10:46:14 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise/How-to-use-props-and-transform-conf-in-splunk/m-p/330867#M8189</guid>
      <dc:creator>jkat54</dc:creator>
      <dc:date>2017-02-28T10:46:14Z</dc:date>
    </item>
    <item>
      <title>Re: How to use props and transform.conf in splunk</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise/How-to-use-props-and-transform-conf-in-splunk/m-p/330868#M8190</link>
      <description>&lt;P&gt;Actually it was just for the learning purpose .I prepare a sample log and feed it to Splunk using file input.My idea was not to use TA and want to extract fields using these 2 confs . May be this TA use props and transform for extraction and I can get some help from that . &lt;/P&gt;</description>
      <pubDate>Tue, 28 Feb 2017 11:02:21 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise/How-to-use-props-and-transform-conf-in-splunk/m-p/330868#M8190</guid>
      <dc:creator>vikas_gopal</dc:creator>
      <dc:date>2017-02-28T11:02:21Z</dc:date>
    </item>
  </channel>
</rss>

