<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Splunk 6, structuredparsing + nullQueue on UF for IIS in Getting Data In</title>
    <link>https://community.splunk.com/t5/Getting-Data-In/Splunk-6-structuredparsing-nullQueue-on-UF-for-IIS/m-p/175534#M35251</link>
    <description>&lt;P&gt;I should say, we don't have any IIS indexed data - we're just getting this added to our Splunk environment today.&lt;/P&gt;</description>
    <pubDate>Wed, 05 Mar 2014 21:05:02 GMT</pubDate>
    <dc:creator>bdruth</dc:creator>
    <dc:date>2014-03-05T21:05:02Z</dc:date>
    <item>
      <title>Splunk 6, structuredparsing + nullQueue on UF for IIS</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Splunk-6-structuredparsing-nullQueue-on-UF-for-IIS/m-p/175524#M35241</link>
      <description>&lt;P&gt;I've been Googling and searching through Splunkbase trying to find an example of using the new structuredparsing queue with the nullQueue to exclude events from being forwarded to the indexer using the new Splunk 6 UF.&lt;/P&gt;

&lt;P&gt;I found this: &lt;A href="http://answers.splunk.com/answers/118668/filter-iis-logs-before-indexing"&gt;http://answers.splunk.com/answers/118668/filter-iis-logs-before-indexing&lt;/A&gt;, but other than a lot of good information on structureparsing, I'm not finding detailed information on how to apply that knowledge.&lt;/P&gt;

&lt;P&gt;If someone could break down a props.conf/transforms.conf example that prevents IIS events from forwarding by HTTP Status code, that would be a huge help and get us moving in the right direction.&lt;/P&gt;

&lt;P&gt;Thanks!&lt;/P&gt;</description>
      <pubDate>Wed, 05 Mar 2014 18:48:22 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Splunk-6-structuredparsing-nullQueue-on-UF-for-IIS/m-p/175524#M35241</guid>
      <dc:creator>bdruth</dc:creator>
      <dc:date>2014-03-05T18:48:22Z</dc:date>
    </item>
    <item>
      <title>Re: Splunk 6, structuredparsing + nullQueue on UF for IIS</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Splunk-6-structuredparsing-nullQueue-on-UF-for-IIS/m-p/175525#M35242</link>
      <description>&lt;P&gt;Try this:  &lt;A href="http://apps.splunk.com/app/1579/"&gt;http://apps.splunk.com/app/1579/&lt;/A&gt; and see if this will help you.&lt;/P&gt;</description>
      <pubDate>Wed, 05 Mar 2014 18:56:15 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Splunk-6-structuredparsing-nullQueue-on-UF-for-IIS/m-p/175525#M35242</guid>
      <dc:creator>dmaislin_splunk</dc:creator>
      <dc:date>2014-03-05T18:56:15Z</dc:date>
    </item>
    <item>
      <title>Re: Splunk 6, structuredparsing + nullQueue on UF for IIS</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Splunk-6-structuredparsing-nullQueue-on-UF-for-IIS/m-p/175526#M35243</link>
      <description>&lt;P&gt;Removing the IIS logs you don't want based on HTTP Status Code is no different than removing the header lines with the exception that the regex that identifies the events with the unwanted HTTP Status Code will be different.  See this post instead:&lt;BR /&gt;
&lt;A href="http://answers.splunk.com/answers/104297/avoid-duplicate-data-and-ignore-fields"&gt;http://answers.splunk.com/answers/104297/avoid-duplicate-data-and-ignore-fields&lt;/A&gt;&lt;BR /&gt;
In that post you will see how to remove the header fields (they all start with a #), and specify the field names for the csv events.&lt;BR /&gt;
We can't give you a specific regex because we don't know your iis log structure (fields and field positions).&lt;BR /&gt;
Can you post some examples?&lt;/P&gt;</description>
      <pubDate>Wed, 05 Mar 2014 19:01:20 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Splunk-6-structuredparsing-nullQueue-on-UF-for-IIS/m-p/175526#M35243</guid>
      <dc:creator>lukejadamec</dc:creator>
      <dc:date>2014-03-05T19:01:20Z</dc:date>
    </item>
    <item>
      <title>Re: Splunk 6, structuredparsing + nullQueue on UF for IIS</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Splunk-6-structuredparsing-nullQueue-on-UF-for-IIS/m-p/175527#M35244</link>
      <description>&lt;P&gt;Maybe I'm misunderstanding the structuredparsing queue, but I thought that allow you to target parsed fields, i.e. not using a regex (which for IIS access logs is going to be fairly ugly and possibly brittle, right?)&lt;/P&gt;</description>
      <pubDate>Wed, 05 Mar 2014 19:56:33 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Splunk-6-structuredparsing-nullQueue-on-UF-for-IIS/m-p/175527#M35244</guid>
      <dc:creator>bdruth</dc:creator>
      <dc:date>2014-03-05T19:56:33Z</dc:date>
    </item>
    <item>
      <title>Re: Splunk 6, structuredparsing + nullQueue on UF for IIS</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Splunk-6-structuredparsing-nullQueue-on-UF-for-IIS/m-p/175528#M35245</link>
      <description>&lt;P&gt;For windows logs in Splunk 6 life did get much easier for parsing Event logs where you can blacklist EventCodes very easily.  They do not have something similar for IIS logs, yet.&lt;BR /&gt;
In my experience creating regex statements to pull the status codes you're looking for, as well as all other IIS log fields - they were pretty solid.  The status codes and other codes typically found at the end of the event, are actually easy and solid, because they are extracted from the end of the event, which is typically very clean with number fields.&lt;BR /&gt;
The specific regex will depend on your log structure.&lt;/P&gt;</description>
      <pubDate>Wed, 05 Mar 2014 20:13:29 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Splunk-6-structuredparsing-nullQueue-on-UF-for-IIS/m-p/175528#M35245</guid>
      <dc:creator>lukejadamec</dc:creator>
      <dc:date>2014-03-05T20:13:29Z</dc:date>
    </item>
    <item>
      <title>Re: Splunk 6, structuredparsing + nullQueue on UF for IIS</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Splunk-6-structuredparsing-nullQueue-on-UF-for-IIS/m-p/175529#M35246</link>
      <description>&lt;P&gt;Gotcha, ok - so here's what our logs are looking like:&lt;/P&gt;

&lt;P&gt;2014-03-05 01:32:45 W3SVC1098397332 10.2.101.194 GET /Resources/example.mp3 - 80 - 10.2.101.20 - 200 0 0&lt;/P&gt;</description>
      <pubDate>Wed, 05 Mar 2014 20:14:41 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Splunk-6-structuredparsing-nullQueue-on-UF-for-IIS/m-p/175529#M35246</guid>
      <dc:creator>bdruth</dc:creator>
      <dc:date>2014-03-05T20:14:41Z</dc:date>
    </item>
    <item>
      <title>Re: Splunk 6, structuredparsing + nullQueue on UF for IIS</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Splunk-6-structuredparsing-nullQueue-on-UF-for-IIS/m-p/175530#M35247</link>
      <description>&lt;P&gt;Is this something that can filter events on the UF before sending to the indexer? It doesn't seem like it, but maybe I'm missing something. This seems like an app on the search head/indexer.&lt;/P&gt;</description>
      <pubDate>Wed, 05 Mar 2014 20:15:53 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Splunk-6-structuredparsing-nullQueue-on-UF-for-IIS/m-p/175530#M35247</guid>
      <dc:creator>bdruth</dc:creator>
      <dc:date>2014-03-05T20:15:53Z</dc:date>
    </item>
    <item>
      <title>Re: Splunk 6, structuredparsing + nullQueue on UF for IIS</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Splunk-6-structuredparsing-nullQueue-on-UF-for-IIS/m-p/175531#M35248</link>
      <description>&lt;P&gt;So, you're looking to drop status 200?&lt;/P&gt;</description>
      <pubDate>Wed, 05 Mar 2014 20:16:51 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Splunk-6-structuredparsing-nullQueue-on-UF-for-IIS/m-p/175531#M35248</guid>
      <dc:creator>lukejadamec</dc:creator>
      <dc:date>2014-03-05T20:16:51Z</dc:date>
    </item>
    <item>
      <title>Re: Splunk 6, structuredparsing + nullQueue on UF for IIS</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Splunk-6-structuredparsing-nullQueue-on-UF-for-IIS/m-p/175532#M35249</link>
      <description>&lt;P&gt;Run this on your entire iis indexed data:&lt;BR /&gt;
&lt;CODE&gt;sourcetype=youriissourcetype |regex "200+\s\d+\s\d+$"&lt;/CODE&gt;&lt;BR /&gt;
And compare the results or result count to this:&lt;BR /&gt;
&lt;CODE&gt;sourcetype=youriissourcetype sc_status=200&lt;/CODE&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 05 Mar 2014 20:55:13 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Splunk-6-structuredparsing-nullQueue-on-UF-for-IIS/m-p/175532#M35249</guid>
      <dc:creator>lukejadamec</dc:creator>
      <dc:date>2014-03-05T20:55:13Z</dc:date>
    </item>
    <item>
      <title>Re: Splunk 6, structuredparsing + nullQueue on UF for IIS</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Splunk-6-structuredparsing-nullQueue-on-UF-for-IIS/m-p/175533#M35250</link>
      <description>&lt;P&gt;We don't have any indexed data - we're hoping to filter it out at the UF before it goes to our indexer, ideally working the first time &lt;span class="lia-unicode-emoji" title=":winking_face:"&gt;😉&lt;/span&gt; ...&lt;/P&gt;</description>
      <pubDate>Wed, 05 Mar 2014 21:04:33 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Splunk-6-structuredparsing-nullQueue-on-UF-for-IIS/m-p/175533#M35250</guid>
      <dc:creator>bdruth</dc:creator>
      <dc:date>2014-03-05T21:04:33Z</dc:date>
    </item>
    <item>
      <title>Re: Splunk 6, structuredparsing + nullQueue on UF for IIS</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Splunk-6-structuredparsing-nullQueue-on-UF-for-IIS/m-p/175534#M35251</link>
      <description>&lt;P&gt;I should say, we don't have any IIS indexed data - we're just getting this added to our Splunk environment today.&lt;/P&gt;</description>
      <pubDate>Wed, 05 Mar 2014 21:05:02 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Splunk-6-structuredparsing-nullQueue-on-UF-for-IIS/m-p/175534#M35251</guid>
      <dc:creator>bdruth</dc:creator>
      <dc:date>2014-03-05T21:05:02Z</dc:date>
    </item>
    <item>
      <title>Re: Splunk 6, structuredparsing + nullQueue on UF for IIS</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Splunk-6-structuredparsing-nullQueue-on-UF-for-IIS/m-p/175535#M35252</link>
      <description>&lt;P&gt;You should create a test index.  Copy one of the iis log files to the indexer temp directory, and use the gui to add it as a file input to your test index.  The bigger the log file the better.&lt;/P&gt;</description>
      <pubDate>Wed, 05 Mar 2014 21:39:40 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Splunk-6-structuredparsing-nullQueue-on-UF-for-IIS/m-p/175535#M35252</guid>
      <dc:creator>lukejadamec</dc:creator>
      <dc:date>2014-03-05T21:39:40Z</dc:date>
    </item>
    <item>
      <title>Re: Splunk 6, structuredparsing + nullQueue on UF for IIS</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Splunk-6-structuredparsing-nullQueue-on-UF-for-IIS/m-p/175536#M35253</link>
      <description>&lt;P&gt;The first yields 113,744 and the second yields 113,908 ... so, nearly identical.&lt;/P&gt;</description>
      <pubDate>Thu, 06 Mar 2014 21:37:51 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Splunk-6-structuredparsing-nullQueue-on-UF-for-IIS/m-p/175536#M35253</guid>
      <dc:creator>bdruth</dc:creator>
      <dc:date>2014-03-06T21:37:51Z</dc:date>
    </item>
    <item>
      <title>Re: Splunk 6, structuredparsing + nullQueue on UF for IIS</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Splunk-6-structuredparsing-nullQueue-on-UF-for-IIS/m-p/175537#M35254</link>
      <description>&lt;P&gt;The first search has an error, somehow an extra + was added.  Try this one:&lt;BR /&gt;
&lt;CODE&gt;sourcetype=youriissourcetype |regex "200\s\d+\s\d+$"&lt;/CODE&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 06 Mar 2014 21:53:38 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Splunk-6-structuredparsing-nullQueue-on-UF-for-IIS/m-p/175537#M35254</guid>
      <dc:creator>lukejadamec</dc:creator>
      <dc:date>2014-03-06T21:53:38Z</dc:date>
    </item>
    <item>
      <title>Re: Splunk 6, structuredparsing + nullQueue on UF for IIS</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Splunk-6-structuredparsing-nullQueue-on-UF-for-IIS/m-p/175538#M35255</link>
      <description>&lt;P&gt;regex and sc_status now yields the same&lt;/P&gt;</description>
      <pubDate>Fri, 07 Mar 2014 20:43:45 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Splunk-6-structuredparsing-nullQueue-on-UF-for-IIS/m-p/175538#M35255</guid>
      <dc:creator>bdruth</dc:creator>
      <dc:date>2014-03-07T20:43:45Z</dc:date>
    </item>
    <item>
      <title>Re: Splunk 6, structuredparsing + nullQueue on UF for IIS</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Splunk-6-structuredparsing-nullQueue-on-UF-for-IIS/m-p/175539#M35256</link>
      <description>&lt;P&gt;I just posted an answer explaining how to use INDEXED_EXTRACTIONS indextime fields to throw away events:&lt;/P&gt;

&lt;P&gt;&lt;A href="https://answers.splunk.com/answers/118668/filter-iis-logs-before-indexing.html#answer-119031"&gt;https://answers.splunk.com/answers/118668/filter-iis-logs-before-indexing.html#answer-119031&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 08 Mar 2016 20:51:53 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Splunk-6-structuredparsing-nullQueue-on-UF-for-IIS/m-p/175539#M35256</guid>
      <dc:creator>amrit</dc:creator>
      <dc:date>2016-03-08T20:51:53Z</dc:date>
    </item>
  </channel>
</rss>

