<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: What is the best way to match more than 3000 patterns used to classify events into multiple sourcetypes? in Getting Data In</title>
    <link>https://community.splunk.com/t5/Getting-Data-In/What-is-the-best-way-to-match-more-than-3000-patterns-used-to/m-p/190681#M37953</link>
    <description>&lt;P&gt;We are evaluating the regex pattern matching and sourcetype configurations (using props.conf + transforms.conf), but we are not sure if 3000+ patterns will be supported or not, and if supported, then what will be downside impact on forwarder/indexer. Will there be any performance impact due to (3000+) pattern matching?&lt;/P&gt;</description>
    <pubDate>Thu, 21 Aug 2014 20:23:43 GMT</pubDate>
    <dc:creator>vganjare</dc:creator>
    <dc:date>2014-08-21T20:23:43Z</dc:date>
    <item>
      <title>What is the best way to match more than 3000 patterns used to classify events into multiple sourcetypes?</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/What-is-the-best-way-to-match-more-than-3000-patterns-used-to/m-p/190673#M37945</link>
      <description>&lt;P&gt;Hi All,&lt;/P&gt;

&lt;P&gt;We have more than 3000 patterns which are used to classify events into multiple sourcetypes. What is the best way implementing this use-case?&lt;/P&gt;

&lt;P&gt;Thanks,&lt;BR /&gt;
Vishal&lt;/P&gt;</description>
      <pubDate>Thu, 21 Aug 2014 17:04:15 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/What-is-the-best-way-to-match-more-than-3000-patterns-used-to/m-p/190673#M37945</guid>
      <dc:creator>vganjare</dc:creator>
      <dc:date>2014-08-21T17:04:15Z</dc:date>
    </item>
    <item>
      <title>Re: What is the best way to match more than 3000 patterns used to classify events into multiple sourcetypes?</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/What-is-the-best-way-to-match-more-than-3000-patterns-used-to/m-p/190674#M37946</link>
      <description>&lt;P&gt;Can you elaborate and provide some examples?  I am unclear about what the issue is and what has been tried to date.&lt;/P&gt;</description>
      <pubDate>Thu, 21 Aug 2014 17:32:56 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/What-is-the-best-way-to-match-more-than-3000-patterns-used-to/m-p/190674#M37946</guid>
      <dc:creator>dmaislin_splunk</dc:creator>
      <dc:date>2014-08-21T17:32:56Z</dc:date>
    </item>
    <item>
      <title>Re: What is the best way to match more than 3000 patterns used to classify events into multiple sourcetypes?</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/What-is-the-best-way-to-match-more-than-3000-patterns-used-to/m-p/190675#M37947</link>
      <description>&lt;P&gt;We are having an application which generates different logs. The logs contains different exceptions from Java application and these exceptions are classified into four different categories:&lt;BR /&gt;
1. Escalate exceptions&lt;BR /&gt;
2. Non-escalate exceptions&lt;BR /&gt;
3. Ignore exceptions&lt;BR /&gt;
4. Unmatched exceptions&lt;BR /&gt;
e.g. Anything starting with NullPointerException should go to Escalated exceptions (and escalated exceptions sourcetype)&lt;/P&gt;</description>
      <pubDate>Thu, 21 Aug 2014 17:41:51 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/What-is-the-best-way-to-match-more-than-3000-patterns-used-to/m-p/190675#M37947</guid>
      <dc:creator>vganjare</dc:creator>
      <dc:date>2014-08-21T17:41:51Z</dc:date>
    </item>
    <item>
      <title>Re: What is the best way to match more than 3000 patterns used to classify events into multiple sourcetypes?</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/What-is-the-best-way-to-match-more-than-3000-patterns-used-to/m-p/190676#M37948</link>
      <description>&lt;P&gt;Try reading this blog as it will help you understand how to re-write sourcetypes based on pattern matching using transforms and props in Splunk:&lt;/P&gt;

&lt;P&gt;&lt;A href="http://blogs.splunk.com/2010/02/11/sourcetypes-gone-wild/"&gt;http://blogs.splunk.com/2010/02/11/sourcetypes-gone-wild/&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 21 Aug 2014 20:09:06 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/What-is-the-best-way-to-match-more-than-3000-patterns-used-to/m-p/190676#M37948</guid>
      <dc:creator>dmaislin_splunk</dc:creator>
      <dc:date>2014-08-21T20:09:06Z</dc:date>
    </item>
    <item>
      <title>Re: What is the best way to match more than 3000 patterns used to classify events into multiple sourcetypes?</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/What-is-the-best-way-to-match-more-than-3000-patterns-used-to/m-p/190677#M37949</link>
      <description>&lt;P&gt;And you want to set the metadata sourcetype at index time or are you ok with using an eval statement to set fieldname called escalated_exceptions=true for example? Sorry I am not quicker to respond, but I am in all day meetings this week off site.&lt;/P&gt;</description>
      <pubDate>Thu, 21 Aug 2014 20:09:41 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/What-is-the-best-way-to-match-more-than-3000-patterns-used-to/m-p/190677#M37949</guid>
      <dc:creator>dmaislin_splunk</dc:creator>
      <dc:date>2014-08-21T20:09:41Z</dc:date>
    </item>
    <item>
      <title>Re: What is the best way to match more than 3000 patterns used to classify events into multiple sourcetypes?</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/What-is-the-best-way-to-match-more-than-3000-patterns-used-to/m-p/190678#M37950</link>
      <description>&lt;P&gt;The blog I referenced above gives a great example on how to rewrite sourcetypes based on regex patterns:&lt;/P&gt;

&lt;P&gt;In props.conf:&lt;/P&gt;

&lt;P&gt;[source::/path/to/sample.log]&lt;BR /&gt;
TRANSFORMS-yummy = setCPSourcetype, setSyslogSourcetype&lt;/P&gt;

&lt;P&gt;In transforms.conf:&lt;/P&gt;

&lt;P&gt;[setCPSourcetype]&lt;BR /&gt;
DEST_KEY = MetaData:Sourcetype&lt;BR /&gt;
REGEX = %PIX-&lt;BR /&gt;
FORMAT = sourcetype::cisco-pix&lt;/P&gt;

&lt;P&gt;[setSyslogSourcetype]&lt;BR /&gt;
DEST_KEY = MetaData:Sourcetype&lt;BR /&gt;
REGEX = \w+ \d+ \d+:\d+:\d+ \S+ \w+[\d+]:&lt;BR /&gt;
FORMAT = sourcetype::syslog&lt;/P&gt;</description>
      <pubDate>Thu, 21 Aug 2014 20:13:17 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/What-is-the-best-way-to-match-more-than-3000-patterns-used-to/m-p/190678#M37950</guid>
      <dc:creator>dmaislin_splunk</dc:creator>
      <dc:date>2014-08-21T20:13:17Z</dc:date>
    </item>
    <item>
      <title>Re: What is the best way to match more than 3000 patterns used to classify events into multiple sourcetypes?</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/What-is-the-best-way-to-match-more-than-3000-patterns-used-to/m-p/190679#M37951</link>
      <description>&lt;P&gt;We want to set the metadata sourcetype at index time.&lt;/P&gt;</description>
      <pubDate>Thu, 21 Aug 2014 20:13:29 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/What-is-the-best-way-to-match-more-than-3000-patterns-used-to/m-p/190679#M37951</guid>
      <dc:creator>vganjare</dc:creator>
      <dc:date>2014-08-21T20:13:29Z</dc:date>
    </item>
    <item>
      <title>Re: What is the best way to match more than 3000 patterns used to classify events into multiple sourcetypes?</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/What-is-the-best-way-to-match-more-than-3000-patterns-used-to/m-p/190680#M37952</link>
      <description>&lt;P&gt;Correct, follow the example and blog above and at index time you can dynamically rewrite the sourcetype based on the patterns you define as the REGEX in the transforms.conf file.&lt;/P&gt;</description>
      <pubDate>Thu, 21 Aug 2014 20:17:09 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/What-is-the-best-way-to-match-more-than-3000-patterns-used-to/m-p/190680#M37952</guid>
      <dc:creator>dmaislin_splunk</dc:creator>
      <dc:date>2014-08-21T20:17:09Z</dc:date>
    </item>
    <item>
      <title>Re: What is the best way to match more than 3000 patterns used to classify events into multiple sourcetypes?</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/What-is-the-best-way-to-match-more-than-3000-patterns-used-to/m-p/190681#M37953</link>
      <description>&lt;P&gt;We are evaluating the regex pattern matching and sourcetype configurations (using props.conf + transforms.conf), but we are not sure if 3000+ patterns will be supported or not, and if supported, then what will be downside impact on forwarder/indexer. Will there be any performance impact due to (3000+) pattern matching?&lt;/P&gt;</description>
      <pubDate>Thu, 21 Aug 2014 20:23:43 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/What-is-the-best-way-to-match-more-than-3000-patterns-used-to/m-p/190681#M37953</guid>
      <dc:creator>vganjare</dc:creator>
      <dc:date>2014-08-21T20:23:43Z</dc:date>
    </item>
    <item>
      <title>Re: What is the best way to match more than 3000 patterns used to classify events into multiple sourcetypes?</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/What-is-the-best-way-to-match-more-than-3000-patterns-used-to/m-p/190682#M37954</link>
      <description>&lt;P&gt;If I were you I would just put everything into a few sourcetypes and use eventtypes vs. spending all those resources to rewrite the sourcetype.&lt;/P&gt;</description>
      <pubDate>Thu, 21 Aug 2014 20:43:10 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/What-is-the-best-way-to-match-more-than-3000-patterns-used-to/m-p/190682#M37954</guid>
      <dc:creator>dmaislin_splunk</dc:creator>
      <dc:date>2014-08-21T20:43:10Z</dc:date>
    </item>
    <item>
      <title>Re: What is the best way to match more than 3000 patterns used to classify events into multiple sourcetypes?</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/What-is-the-best-way-to-match-more-than-3000-patterns-used-to/m-p/190683#M37955</link>
      <description>&lt;P&gt;Adding more details:&lt;/P&gt;

&lt;P&gt;We have 4 sourcetypes: .log, .out, .debug and .err&lt;BR /&gt;
Phase-1: Apply 1000 patterns to filter out unwanted data using NullQueue and IndexQueue on Heavy Forwarder-&lt;BR /&gt;
[log]&lt;BR /&gt;
TRANSFORMS-set = setnull,setraw&lt;/P&gt;

&lt;P&gt;setnull=.&lt;BR /&gt;
setraw=1000 patterns&lt;/P&gt;

&lt;P&gt;Phase-2: Apply Escalate, Non-Escalate patterns to this output using EXTRACT keyword in props.conf to in respective fields.&lt;BR /&gt;
EXTRACT-esc=1000 patterns&lt;BR /&gt;
EXTRACT-nonesc=2000 patterns&lt;BR /&gt;
In this case, will there be any performance issue on Heavy forwarder and Indexer? Can Splunk handle 3000 patterns at search time and 1000 at parsing time?&lt;/P&gt;</description>
      <pubDate>Fri, 22 Aug 2014 05:02:36 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/What-is-the-best-way-to-match-more-than-3000-patterns-used-to/m-p/190683#M37955</guid>
      <dc:creator>meenal901</dc:creator>
      <dc:date>2014-08-22T05:02:36Z</dc:date>
    </item>
    <item>
      <title>Re: What is the best way to match more than 3000 patterns used to classify events into multiple sourcetypes?</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/What-is-the-best-way-to-match-more-than-3000-patterns-used-to/m-p/190684#M37956</link>
      <description>&lt;P&gt;I second the idea of using eventtypes&lt;/P&gt;</description>
      <pubDate>Wed, 27 Aug 2014 11:40:06 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/What-is-the-best-way-to-match-more-than-3000-patterns-used-to/m-p/190684#M37956</guid>
      <dc:creator>Runals</dc:creator>
      <dc:date>2014-08-27T11:40:06Z</dc:date>
    </item>
  </channel>
</rss>

