<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Why has Splunk stopped real time monitoring of log files? in Getting Data In</title>
    <link>https://community.splunk.com/t5/Getting-Data-In/Why-has-Splunk-stopped-real-time-monitoring-of-log-files/m-p/373296#M67669</link>
    <description>&lt;P&gt;this is my regex for the log files:&lt;BR /&gt;
&lt;A href="http://imgur.com/B9sp72o"&gt;Image&lt;/A&gt;&lt;/P&gt;

&lt;P&gt;I'm reading this error too:&lt;/P&gt;

&lt;P&gt;05-11-2017 14:58:54.997 -0300 INFO  TailReader - File descriptor cache is full (100), trimming...&lt;/P&gt;

&lt;P&gt;Is this one about the number of files that can be open at the same time?&lt;/P&gt;</description>
    <pubDate>Thu, 11 May 2017 18:34:37 GMT</pubDate>
    <dc:creator>coronelfoca</dc:creator>
    <dc:date>2017-05-11T18:34:37Z</dc:date>
    <item>
      <title>Why has Splunk stopped real time monitoring of log files?</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Why-has-Splunk-stopped-real-time-monitoring-of-log-files/m-p/373292#M67665</link>
      <description>&lt;P&gt;I have my Splunk configured to monitor 3 directories, there our simulator keeps placing new .log files.&lt;/P&gt;

&lt;P&gt;It used to work perfectly, every time a new file was placed in "C:/...../First" my monitoring on that path would index it in the FIRST index.&lt;BR /&gt;
Then, the user could do a search with index = first and it would work just great.&lt;/P&gt;

&lt;P&gt;Now, suddenly, It stopped the real time monitoring. As I place new log files in the folder, splunk won't do a thing. it won't show in search results until I go into the bin folder with CMD and go for&lt;BR /&gt;
splunk stop&lt;BR /&gt;
splunk clean eventdata&lt;BR /&gt;
splunk start.&lt;/P&gt;

&lt;P&gt;What could make this stop working from nothing??&lt;/P&gt;</description>
      <pubDate>Wed, 10 May 2017 21:09:04 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Why-has-Splunk-stopped-real-time-monitoring-of-log-files/m-p/373292#M67665</guid>
      <dc:creator>coronelfoca</dc:creator>
      <dc:date>2017-05-10T21:09:04Z</dc:date>
    </item>
    <item>
      <title>Re: Why has Splunk stopped real time monitoring of log files?</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Why-has-Splunk-stopped-real-time-monitoring-of-log-files/m-p/373293#M67666</link>
      <description>&lt;P&gt;Your first stop should be the splunkd.log file to see if it's logging the cause.&lt;/P&gt;</description>
      <pubDate>Wed, 10 May 2017 21:14:53 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Why-has-Splunk-stopped-real-time-monitoring-of-log-files/m-p/373293#M67666</guid>
      <dc:creator>suarezry</dc:creator>
      <dc:date>2017-05-10T21:14:53Z</dc:date>
    </item>
    <item>
      <title>Re: Why has Splunk stopped real time monitoring of log files?</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Why-has-Splunk-stopped-real-time-monitoring-of-log-files/m-p/373294#M67667</link>
      <description>&lt;P&gt;Thanks, I'm really new to splunk and kind of lost.&lt;/P&gt;

&lt;P&gt;He is getting me this error message:&lt;/P&gt;

&lt;P&gt;05-11-2017 13:55:28.854 -0300 ERROR WatchedFile - Regex host extraction failed for source 'source::C:\Users\Administrator\Documents\Logs Passthrough\First\Demonstracao\012000004645001\0200\012000004645001_0200_003000_000000001250_2017-05-10_17-00-52.log' due to: this regex must contain a capture group (parentheses).&lt;/P&gt;

&lt;P&gt;is it about my regex from source type?&lt;/P&gt;</description>
      <pubDate>Tue, 29 Sep 2020 14:01:43 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Why-has-Splunk-stopped-real-time-monitoring-of-log-files/m-p/373294#M67667</guid>
      <dc:creator>coronelfoca</dc:creator>
      <dc:date>2020-09-29T14:01:43Z</dc:date>
    </item>
    <item>
      <title>Re: Why has Splunk stopped real time monitoring of log files?</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Why-has-Splunk-stopped-real-time-monitoring-of-log-files/m-p/373295#M67668</link>
      <description>&lt;P&gt;Post your regex&lt;/P&gt;</description>
      <pubDate>Thu, 11 May 2017 17:30:23 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Why-has-Splunk-stopped-real-time-monitoring-of-log-files/m-p/373295#M67668</guid>
      <dc:creator>suarezry</dc:creator>
      <dc:date>2017-05-11T17:30:23Z</dc:date>
    </item>
    <item>
      <title>Re: Why has Splunk stopped real time monitoring of log files?</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Why-has-Splunk-stopped-real-time-monitoring-of-log-files/m-p/373296#M67669</link>
      <description>&lt;P&gt;this is my regex for the log files:&lt;BR /&gt;
&lt;A href="http://imgur.com/B9sp72o"&gt;Image&lt;/A&gt;&lt;/P&gt;

&lt;P&gt;I'm reading this error too:&lt;/P&gt;

&lt;P&gt;05-11-2017 14:58:54.997 -0300 INFO  TailReader - File descriptor cache is full (100), trimming...&lt;/P&gt;

&lt;P&gt;Is this one about the number of files that can be open at the same time?&lt;/P&gt;</description>
      <pubDate>Thu, 11 May 2017 18:34:37 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Why-has-Splunk-stopped-real-time-monitoring-of-log-files/m-p/373296#M67669</guid>
      <dc:creator>coronelfoca</dc:creator>
      <dc:date>2017-05-11T18:34:37Z</dc:date>
    </item>
    <item>
      <title>Re: Why has Splunk stopped real time monitoring of log files?</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Why-has-Splunk-stopped-real-time-monitoring-of-log-files/m-p/373297#M67670</link>
      <description>&lt;P&gt;&lt;A href="http://imgur.com/a/rX6Ro"&gt;http://imgur.com/a/rX6Ro&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 11 May 2017 18:35:22 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Why-has-Splunk-stopped-real-time-monitoring-of-log-files/m-p/373297#M67670</guid>
      <dc:creator>coronelfoca</dc:creator>
      <dc:date>2017-05-11T18:35:22Z</dc:date>
    </item>
    <item>
      <title>Re: Why has Splunk stopped real time monitoring of log files?</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Why-has-Splunk-stopped-real-time-monitoring-of-log-files/m-p/373298#M67671</link>
      <description>&lt;P&gt;Can you please post your props.conf and transforms.conf.  These will contain your regex and will be more informative for me.&lt;/P&gt;</description>
      <pubDate>Thu, 11 May 2017 23:26:39 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Why-has-Splunk-stopped-real-time-monitoring-of-log-files/m-p/373298#M67671</guid>
      <dc:creator>suarezry</dc:creator>
      <dc:date>2017-05-11T23:26:39Z</dc:date>
    </item>
    <item>
      <title>Re: Why has Splunk stopped real time monitoring of log files?</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Why-has-Splunk-stopped-real-time-monitoring-of-log-files/m-p/373299#M67672</link>
      <description>&lt;P&gt;these ones?&lt;/P&gt;

&lt;P&gt;transforms.conf:&lt;/P&gt;

&lt;H1&gt;Version 6.5.1&lt;/H1&gt;

&lt;H1&gt;DO NOT EDIT THIS FILE!&lt;/H1&gt;

&lt;H1&gt;Changes to default files will be lost on update and are difficult to&lt;/H1&gt;

&lt;H1&gt;manage and support.&lt;/H1&gt;

&lt;H1&gt;Please make any changes to system defaults by overriding them in&lt;/H1&gt;

&lt;H1&gt;apps or $SPLUNK_HOME/etc/system/local&lt;/H1&gt;

&lt;H1&gt;(See "Configuration file precedence" in the web documentation).&lt;/H1&gt;

&lt;H1&gt;To override a specific setting, copy the name of the stanza and&lt;/H1&gt;

&lt;H1&gt;setting to the file where you wish to override it.&lt;/H1&gt;

&lt;H1&gt;This file contains possible attributes and values you can use to&lt;/H1&gt;

&lt;H1&gt;configure transform and event signing in transforms.conf.&lt;/H1&gt;

&lt;P&gt;SOURCE_KEY = _raw &lt;BR /&gt;
LOOKAHEAD = 4096&lt;BR /&gt;
REGEX = &lt;BR /&gt;
FORMAT = &lt;BR /&gt;
DEFAULT_VALUE = &lt;BR /&gt;
DEST_KEY = &lt;BR /&gt;
WRITE_META = False&lt;BR /&gt;
MV_ADD = False&lt;BR /&gt;
CLEAN_KEYS = True&lt;BR /&gt;
CAN_OPTIMIZE = True&lt;BR /&gt;
KEEP_EMPTY_VALS = False&lt;/P&gt;

&lt;P&gt;[sendToTCP]&lt;BR /&gt;
DEST_KEY = queue&lt;BR /&gt;
REGEX = .&lt;BR /&gt;
FORMAT = tcpOutQueue&lt;/P&gt;

&lt;P&gt;[filetype]&lt;BR /&gt;
REGEX = (?:[\w_].([A-Za-z]{2}\w)(?!\w))&lt;/P&gt;

&lt;P&gt;[loglevel]&lt;BR /&gt;
REGEX = (FATAL|ERROR|WARN|INFO|DEBUG|TRACE)&lt;/P&gt;

&lt;P&gt;[loglevel-weblogic]&lt;BR /&gt;
REGEX = #+&amp;lt;\w+ \d+, \d+ \d+:\d+:\d+ \w+ \w+&amp;gt; &amp;lt;(\w+)&amp;gt;&lt;BR /&gt;
FORMAT = loglevel::$1&lt;/P&gt;

&lt;P&gt;[os]&lt;BR /&gt;
REGEX = (?i:(?[^"]*+)"&lt;/P&gt;

&lt;P&gt;[sbstring]&lt;/P&gt;

&lt;H1&gt;matches a string enclosed in [] - extracts an unnamed variable - name MUST be provided as in [[sbstring:name]]&lt;/H1&gt;

&lt;H1&gt;Extracts: empty-name-group (needs name)&lt;/H1&gt;

&lt;P&gt;REGEX = [(?&amp;lt;&amp;gt;[^]]*+)]&lt;/P&gt;

&lt;P&gt;[digits]&lt;BR /&gt;
REGEX = \d+&lt;/P&gt;

&lt;P&gt;[int]&lt;/P&gt;

&lt;H1&gt;matches an integer or a hex number&lt;/H1&gt;

&lt;P&gt;REGEX = 0x[a-fA-F0-9]+|\d+&lt;/P&gt;

&lt;P&gt;[float]&lt;/P&gt;

&lt;H1&gt;matches a float (or an int)&lt;/H1&gt;

&lt;P&gt;REGEX = \d*.\d+|[[int]]&lt;/P&gt;

&lt;P&gt;[octet] &lt;/P&gt;

&lt;H1&gt;this would match only numbers from 0-255 (one octet in an ip)&lt;/H1&gt;

&lt;P&gt;REGEX = (?:2(?:5[0-5]|[0-4][0-9])|[0-1][0-9][0-9]|[0-9][0-9]?)&lt;/P&gt;

&lt;P&gt;[ipv4]&lt;/P&gt;

&lt;H1&gt;matches a valid IPv4 optionally followed by :port_num the octets in the ip would also be validated 0-255 range&lt;/H1&gt;

&lt;H1&gt;Extracts: ip, port&lt;/H1&gt;

&lt;P&gt;REGEX = (?&lt;A href="https://community.splunk.com/?:.%5B%5Boctet%5D%5D" target="_blank"&gt;[octet]&lt;/A&gt;{3})(?::[[int:port]])?&lt;/P&gt;

&lt;P&gt;[simple_url]&lt;/P&gt;

&lt;H1&gt;matches a url of the form proto://domain.tld/uri&lt;/H1&gt;

&lt;H1&gt;Extracts: url, domain&lt;/H1&gt;

&lt;P&gt;REGEX = (?\w++://(?[a-zA-Z0-9-.:]++)(?:/[^\s"]*)?)&lt;/P&gt;

&lt;P&gt;[url]&lt;/P&gt;

&lt;H1&gt;matches a url of the form proto://domain.tld/uri&lt;/H1&gt;

&lt;H1&gt;Extracts: url, proto, domain, uri&lt;/H1&gt;

&lt;P&gt;REGEX = (?[[alphas:proto]]://(?[a-zA-Z0-9-.:]++)(?/[^\s"]*)?)&lt;/P&gt;

&lt;P&gt;[simple_uri]&lt;/P&gt;

&lt;H1&gt;matches a uri of the form /path/to/resource?query&lt;/H1&gt;

&lt;H1&gt;Extracts: uri, uri_path, uri_query&lt;/H1&gt;

&lt;P&gt;REGEX = (?(?[^\s\?"]++)(?:\?(?[^\s"]+))?)&lt;/P&gt;

&lt;P&gt;[uri]&lt;/P&gt;

&lt;H1&gt;uri  = path optionally followed by query [/this/path/file.js?query=part&amp;amp;other=var]&lt;/H1&gt;

&lt;H1&gt;path = root part followed by file        [/root/part/file.part]&lt;/H1&gt;

&lt;H1&gt;Extracts: uri, uri_path, uri_root, uri_file, uri_query, uri_domain (optional if in proxy mode)&lt;/H1&gt;

&lt;P&gt;REGEX = (?(?:\w++://(?[^/\s]++))?(?(?/+(?:[^\s\?;=/]&lt;EM&gt;+/+)&lt;/EM&gt;)(?[^\s\?;=?/]*+))(?:\?(?[^\s"]+))?)&lt;/P&gt;

&lt;H6&gt;BASIC MODULAR REGULAR EXPRESSIONS DEFINITION END&lt;/H6&gt;

&lt;H1&gt;EXAMPLE syslog header stripper&lt;/H1&gt;

&lt;H1&gt;This will just strip the time stamp&lt;/H1&gt;

&lt;P&gt;[syslog-header-stripper-ts]&lt;BR /&gt;
REGEX         = ^[A-Z][a-z]+\s+\d+\s\d+:\d+:\d+\s(.*)$&lt;BR /&gt;
FORMAT        = $1&lt;BR /&gt;
DEST_KEY      = _raw&lt;/P&gt;

&lt;H1&gt;This will strip the syslog header (date stamp and host) from a syslog event&lt;/H1&gt;

&lt;P&gt;[syslog-header-stripper-ts-host]&lt;BR /&gt;
REGEX         = ^[A-Z][a-z]+\s+\d+\s\d+:\d+:\d+\s[^\s]&lt;EM&gt;\s(.&lt;/EM&gt;)$&lt;BR /&gt;
FORMAT        = $1&lt;BR /&gt;
DEST_KEY      = _raw&lt;/P&gt;

&lt;H1&gt;This will strip out date stamp, host, process with pid and just get the&lt;/H1&gt;

&lt;H1&gt;actual message&lt;/H1&gt;

&lt;P&gt;[syslog-header-stripper-ts-host-proc]&lt;BR /&gt;
REGEX         = ^[A-Z][a-z]+\s+\d+\s\d+:\d+:\d+\s.&lt;EM&gt;?:\s(.&lt;/EM&gt;)$&lt;BR /&gt;
FORMAT        = $1&lt;BR /&gt;
DEST_KEY      = _raw&lt;/P&gt;

&lt;P&gt;[syslog-host]&lt;BR /&gt;
DEST_KEY = MetaData:Host&lt;BR /&gt;
REGEX = :\d\d\s+(?:\d+\s+|(?:user|daemon|local.?).\w+\s+)*[?(\w[\w.-]{2,})]?\s&lt;BR /&gt;
FORMAT = host::$1&lt;/P&gt;

&lt;P&gt;[syslog-host-full]&lt;BR /&gt;
DEST_KEY = MetaData:Host&lt;BR /&gt;
REGEX = ^[^:]&lt;EM&gt;\d\d:\d\d:\d\d[^:]&lt;/EM&gt;?\s((\d+.\d+.\d+.\d+)|(\w[\w.-]{2,})(?=\s+[^\s:]+:))&lt;BR /&gt;
FORMAT = host::$1&lt;/P&gt;

&lt;H1&gt;These next three transforms date back to 'meta events', or the long-dead&lt;/H1&gt;

&lt;H1&gt;index-time transaction-like feature; they're left here in case someone is using them&lt;/H1&gt;

&lt;H1&gt;at search time to extract fields.&lt;/H1&gt;

&lt;P&gt;[log4-severity]&lt;BR /&gt;
REGEX = .*?([A-Z]+) [\w.]+ - &lt;BR /&gt;
FORMAT = severity::$1&lt;/P&gt;

&lt;P&gt;[sendmail-pid]&lt;BR /&gt;
REGEX = [(\d+)]&lt;BR /&gt;
FORMAT = pid::$1&lt;/P&gt;

&lt;P&gt;[sendmail-qid]&lt;BR /&gt;
REGEX = sendmail[\d+]: (\w+):&lt;BR /&gt;
FORMAT = qid::$1&lt;/P&gt;

&lt;P&gt;[cisco-codes]&lt;BR /&gt;
REGEX = : (?i)%([a-z0-9_]+)-(?:[a-z0-9_]+-)?([0-7])-([a-z0-9_]+): &lt;BR /&gt;
FORMAT = product::$1 code::$2 severity::$3&lt;/P&gt;

&lt;P&gt;[syslog-process]&lt;BR /&gt;
REGEX = (([a-zA-Z0-9_]+))[\d+]:&lt;BR /&gt;
FORMAT = process::$1&lt;/P&gt;

&lt;P&gt;[was-trlog-code]&lt;BR /&gt;
REGEX = ] ([a-fA-F0-9]{8}) &lt;BR /&gt;
FORMAT = code::$1&lt;/P&gt;

&lt;P&gt;[weblogic-code]&lt;BR /&gt;
REGEX = &lt;BR /&gt;
FORMAT = code::$1&lt;/P&gt;

&lt;P&gt;[novell-groupwise-arrival]&lt;/P&gt;

&lt;H1&gt;ARR MsgType,OriginUserID,MessageID,filename,OriginIDomain,OriginDomain,OriginPostOffice, PreviousHop,Size,Priority,TargApp,ReportStatus,ReportDestination,[destination{destnumber},  ]&lt;/H1&gt;

&lt;P&gt;REGEX = ARR ([^,]&lt;EM&gt;),([^,]&lt;/EM&gt;),([^,]&lt;EM&gt;),([^,]&lt;/EM&gt;),([^,]&lt;EM&gt;),([^,]&lt;/EM&gt;),([^,]&lt;EM&gt;),([^,]&lt;/EM&gt;),([^,]&lt;EM&gt;),([^,]&lt;/EM&gt;),([^,]&lt;EM&gt;),([^,]&lt;/EM&gt;),([^,]&lt;EM&gt;),(.&lt;/EM&gt;)$&lt;BR /&gt;
FORMAT = $0 msgtype::$1 originuserid::$2 messageid::$3 filename::$4 originidomain::$5 origindomain::$6 originpostoffice::$7  previoushop::$8 size::$9 priority::$10 targapp::$11 reportstatus::$12 reportdestination::$13 destination::$14 &lt;BR /&gt;
DEST_KEY = _meta&lt;/P&gt;

&lt;P&gt;[novell-groupwise-queue]&lt;/P&gt;

&lt;H1&gt;QUE filename,NextHopType,NextHopName,[destnum,]&lt;/H1&gt;

&lt;P&gt;REGEX = QUE ([^,]&lt;EM&gt;),([^,]&lt;/EM&gt;),([^,]&lt;EM&gt;),(.&lt;/EM&gt;)$&lt;BR /&gt;
FORMAT = $0 filename::$1 nexthoptype::$2 nexthopname::$3 destnum::$4&lt;BR /&gt;
DEST_KEY = _meta&lt;/P&gt;

&lt;P&gt;[novell-groupwise-transfer]&lt;/P&gt;

&lt;H1&gt;TRN PeerName,filename,Size,SendTime&lt;/H1&gt;

&lt;P&gt;REGEX = QUE ([^,]&lt;EM&gt;),([^,]&lt;/EM&gt;),([^,]&lt;EM&gt;),([^,]&lt;/EM&gt;)$&lt;BR /&gt;
FORMAT = $0 peername::$1 filename::$2 size::$3 sendtime::$4 &lt;BR /&gt;
DEST_KEY = _meta&lt;/P&gt;

&lt;H6&gt;## access-extractions helpers start&lt;/H6&gt;

&lt;H1&gt;make sure to handle escaped quotes (\") inside the URI&lt;/H1&gt;

&lt;P&gt;[uri_seg]&lt;BR /&gt;
REGEX = (?:\"|[^\s\?/"])*+/++&lt;/P&gt;

&lt;P&gt;[uri_root]&lt;BR /&gt;
REGEX = /++(?(?:\"|[^\s\?/"])++)/++&lt;/P&gt;

&lt;P&gt;[bc_domain]&lt;BR /&gt;
REGEX = (?\w++://[^/\s"]++)&lt;/P&gt;

&lt;P&gt;[bc_uri]&lt;/P&gt;

&lt;H1&gt;backwards compatible uri regex&lt;/H1&gt;

&lt;H1&gt;uri  = path optionally followed by query [/this/path/file.js?query=part&amp;amp;other=var]&lt;/H1&gt;

&lt;H1&gt;path = root part followed by file        [/root/part/file.part]&lt;/H1&gt;

&lt;H1&gt;Extracts: uri, uri_path, root, file, uri_query, uri_domain (optional if in proxy mode)&lt;/H1&gt;

&lt;P&gt;REGEX = (?[[bc_domain:uri_]]?+(?[[uri_root]]?[[uri_seg]]&lt;EM&gt;(?[^\s\?/]+)?)(?:\?(?[^\s]&lt;/EM&gt;))?)&lt;/P&gt;

&lt;P&gt;[reqstr]&lt;BR /&gt;
REGEX = [^\s"]++&lt;/P&gt;

&lt;P&gt;[access-request]&lt;/P&gt;

&lt;H1&gt;very relaxed regex for extracting fields from the request&lt;/H1&gt;

&lt;P&gt;REGEX = "\s*+[[reqstr:method]]?(?:\s++&lt;A href="https://community.splunk.com/?:s++%5B%5Breqstr:version%5D%5D" target="_blank"&gt;[bc_uri]&lt;/A&gt;&lt;EM&gt;)?\s&lt;/EM&gt;+"&lt;/P&gt;

&lt;H6&gt;## access-extractions helpers end&lt;/H6&gt;

&lt;P&gt;[access-extractions]&lt;/P&gt;

&lt;H1&gt;matches access-common or access-combined apache logging formats&lt;/H1&gt;

&lt;H1&gt;Extracts: clientip, clientport, ident, user, req_time, method, uri, root, file, uri_domain, uri_query, version, status, bytes, referer_url, referer_domain, referer_proto, useragent, cookie, other (remaining chars)&lt;/H1&gt;

&lt;H1&gt;Note: referer is misspelled in purpose because that is the "official" spelling for "HTTP referer"&lt;/H1&gt;

&lt;P&gt;REGEX = ^[[nspaces:clientip]]\s++[[nspaces:ident]]\s++[[nspaces:user]]\s++[[sbstring:req_time]]\s++[[access-request]]\s++[[nspaces:status]]\s++&lt;A href="https://community.splunk.com/?:s++%22(?%5B%5Bbc_domain:referer_%5D%5D?+%5B%5E%22%5D*+)%22(?:s++%5B%5Bqstring:useragent%5D%5D(?:s++%5B%5Bqstring:cookie%5D%5D)?+)?+" target="_blank"&gt;[nspaces:bytes]&lt;/A&gt;?[[all:other]]&lt;/P&gt;

&lt;P&gt;[splunk-access-extractions]&lt;/P&gt;

&lt;H1&gt;splunk_access.log uses a slightly extended log format&lt;/H1&gt;

&lt;P&gt;REGEX = ^[[nspaces:clientip]]\s++[[nspaces:ident]]\s++[[nspaces:user]]\s++[[sbstring:req_time]]\s++[[access-request]]\s++[[nspaces:status]]\s++&lt;A href="https://community.splunk.com/?:s++%22(?%5B%5Bbc_domain:referer_%5D%5D?+%5B%5E%22%5D*+)%22(?:s++%5B%5Bqstring:useragent%5D%5D(?:s++%5B%5Bnspaces:vhost%5D%5D)?(?:s++%5B%5Bnspaces:requestid%5D%5D)?)?" target="_blank"&gt;[nspaces:bytes]&lt;/A&gt;?[[all:other]]&lt;/P&gt;

&lt;P&gt;[splunk-service-extractions]&lt;BR /&gt;
REGEX = (?i)^(?:[^ ]* ){2}(?P[^\s]*)\s+[(?P\w+)]\s+(?P[^ ]+):(?P\d+) - (?P.+)&lt;/P&gt;

&lt;P&gt;[syslog-extractions]&lt;BR /&gt;
REGEX = \s([^\s[]+)(?:[(\d+)])?:\s&lt;BR /&gt;
FORMAT = process::$1 pid::$2&lt;/P&gt;

&lt;P&gt;[sendmail-extractions]&lt;BR /&gt;
REGEX = sendmail[(\d+)]: (\w+):&lt;BR /&gt;
FORMAT = process::sendmail pid::$1 qid::$2&lt;/P&gt;

&lt;P&gt;[splunkd-disassembler]&lt;BR /&gt;
REGEX = ^\S+\s\S+\s+(\S+)\s+(\S+)&lt;BR /&gt;
FORMAT = $0 level::$1 component::$2&lt;BR /&gt;
DEST_KEY = _meta&lt;/P&gt;

&lt;P&gt;[splunk_help] &lt;BR /&gt;
DEST_KEY = _MetaData:Index&lt;BR /&gt;
REGEX = .&lt;BR /&gt;
FORMAT = help&lt;/P&gt;

&lt;P&gt;[splunk_index_history]&lt;BR /&gt;
DEST_KEY   = _MetaData:Index&lt;BR /&gt;
REGEX      = .&lt;BR /&gt;
FORMAT     = history&lt;/P&gt;

&lt;P&gt;[send_to_nullqueue]&lt;BR /&gt;
DEST_KEY = queue&lt;BR /&gt;
REGEX    = .&lt;BR /&gt;
FORMAT   = nullQueue&lt;/P&gt;

&lt;P&gt;[tcpdump-endpoints]&lt;BR /&gt;
REGEX = (\d+.\d+.\d+.\d+):(\d+) -&amp;gt; (\d+.\d+.\d+.\d+):(\d+)&lt;BR /&gt;
FORMAT = src_ip::$1 src_port::$2 dest_ip::$3 dest_port::$4&lt;/P&gt;

&lt;P&gt;[colon-kv]&lt;BR /&gt;
REGEX = (?&amp;lt;= )([A-Za-z]+): ?((0x[A-F\d]+)|\d+)(?= |\n|$)&lt;BR /&gt;
FORMAT = $1::$2&lt;/P&gt;

&lt;P&gt;[num-kv]&lt;BR /&gt;
REGEX = ([A-Za-z_][\w_]*)[=:\s]+((0x[A-F\d]+)|[+-]?[\d.]+)&lt;BR /&gt;
FORMAT = $1::$2 &lt;/P&gt;

&lt;P&gt;[colon-line]&lt;BR /&gt;
REGEX = ^(\w+)\s*:[ \t]&lt;EM&gt;(.&lt;/EM&gt;?)$&lt;BR /&gt;
FORMAT = $1::$2&lt;/P&gt;

&lt;P&gt;[bracket-space]&lt;BR /&gt;
REGEX = [(\S+) (.*?)]&lt;BR /&gt;
FORMAT = $1::$2&lt;/P&gt;

&lt;P&gt;[db2]&lt;BR /&gt;
REGEX = ([A-Z]+) &lt;EM&gt;: (.&lt;/EM&gt;?)(?=\n|$| +[A-Z]+ *:)&lt;BR /&gt;
FORMAT = $1::$2&lt;/P&gt;

&lt;H1&gt;Example external lookup&lt;/H1&gt;

&lt;P&gt;[dnslookup]&lt;BR /&gt;
external_cmd = external_lookup.py clienthost clientip&lt;BR /&gt;
fields_list = clienthost,clientip&lt;/P&gt;

&lt;P&gt;[registry]&lt;BR /&gt;
DELIMS="\n","=:"&lt;/P&gt;

&lt;H1&gt;[guid_lookup]&lt;/H1&gt;

&lt;H1&gt;filename = guid_lookup.csv&lt;/H1&gt;

&lt;H1&gt;max_matches = 1&lt;/H1&gt;

&lt;H1&gt;min_matches = 1&lt;/H1&gt;

&lt;H1&gt;[sid_lookup]&lt;/H1&gt;

&lt;H1&gt;filename = sid_lookup.csv&lt;/H1&gt;

&lt;H1&gt;max_matches = 1&lt;/H1&gt;

&lt;H1&gt;min_matches = 1&lt;/H1&gt;

&lt;P&gt;[guid-to-translate]&lt;BR /&gt;
REGEX = (?\w{8}-\w{4}-\w{4}-\w{4}-\w{12})&lt;BR /&gt;
MV_ADD = true&lt;/P&gt;

&lt;P&gt;[wel-message]&lt;BR /&gt;
REGEX = (?sm)^(?&amp;lt;_pre_msg&amp;gt;.+)\nMessage=(?.+)$&lt;BR /&gt;
CLEAN_KEYS = false&lt;/P&gt;

&lt;P&gt;[wel-eq-kv]&lt;BR /&gt;
SOURCE_KEY = _pre_msg&lt;BR /&gt;
DELIMS     = "\n","="&lt;BR /&gt;
MV_ADD     = true&lt;/P&gt;

&lt;P&gt;[wel-col-kv]&lt;BR /&gt;
SOURCE_KEY = Message&lt;BR /&gt;
REGEX      = \n([^:\n\r]+):[ \t]++([^\n]*)&lt;BR /&gt;
FORMAT     = $1::$2&lt;BR /&gt;
MV_ADD     = true&lt;/P&gt;

&lt;P&gt;[ad-kv]&lt;BR /&gt;
REGEX      = (?&amp;lt;_KEY_1&amp;gt;[\w-]+)=(?&amp;lt;_VAL_1&amp;gt;[^\r\n]*)&lt;BR /&gt;
MV_ADD     = true&lt;/P&gt;

&lt;P&gt;[perfmon-kv]&lt;BR /&gt;
DELIMS     = "\n","="&lt;/P&gt;

&lt;P&gt;[wmi-host]&lt;BR /&gt;
REGEX = (?m)ComputerName=(.+)&lt;BR /&gt;
DEST_KEY = MetaData:Host&lt;BR /&gt;
FORMAT = host::$1&lt;/P&gt;

&lt;P&gt;[wmi-override-host]&lt;BR /&gt;
REGEX = (?m)wmi_hostname=(.+)&lt;BR /&gt;
DEST_KEY = MetaData:Host&lt;BR /&gt;
FORMAT = host::$1&lt;/P&gt;

&lt;P&gt;[strip-winevt-linebreaker]&lt;BR /&gt;
REGEX = (?s)^(.*)---splunk-wevt-end-of-event---&lt;BR /&gt;
FORMAT = $1&lt;BR /&gt;
DEST_KEY = _raw&lt;/P&gt;

&lt;P&gt;[stash_extract]&lt;BR /&gt;
DELIMS       = ",", "="&lt;BR /&gt;
CAN_OPTIMIZE = false&lt;BR /&gt;
MV_ADD       = true&lt;BR /&gt;
CLEAN_KEYS   = false&lt;/P&gt;

&lt;P&gt;[set_sourcetype_to_stash]&lt;BR /&gt;
REGEX    = .&lt;BR /&gt;
DEST_KEY = MetaData:Sourcetype&lt;BR /&gt;
FORMAT   = sourcetype::stash&lt;/P&gt;

&lt;P&gt;[extract_spent]&lt;BR /&gt;
REGEX   = \s(?P\d+(.\d+)?)ms$&lt;/P&gt;

&lt;HR /&gt;

&lt;HR /&gt;</description>
      <pubDate>Tue, 29 Sep 2020 14:03:14 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Why-has-Splunk-stopped-real-time-monitoring-of-log-files/m-p/373299#M67672</guid>
      <dc:creator>coronelfoca</dc:creator>
      <dc:date>2020-09-29T14:03:14Z</dc:date>
    </item>
    <item>
      <title>Re: Why has Splunk stopped real time monitoring of log files?</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Why-has-Splunk-stopped-real-time-monitoring-of-log-files/m-p/373300#M67673</link>
      <description>&lt;P&gt;props.conf:&lt;/P&gt;

&lt;P&gt;[Passthrough]&lt;BR /&gt;
DATETIME_CONFIG = &lt;BR /&gt;
NO_BINARY_CHECK = true&lt;BR /&gt;
category = Custom&lt;BR /&gt;
pulldown_type = 1&lt;BR /&gt;
BREAK_ONLY_BEFORE = [&amp;lt;][a][u][d][i][t][&amp;gt;]&lt;BR /&gt;
disabled = false&lt;/P&gt;

&lt;P&gt;[tmp_injetor_safra]&lt;BR /&gt;
BREAK_ONLY_BEFORE = [&amp;lt;][/][l][o][g][&amp;gt;]&lt;BR /&gt;
DATETIME_CONFIG = &lt;BR /&gt;
NO_BINARY_CHECK = true&lt;BR /&gt;
category = Custom&lt;BR /&gt;
pulldown_type = 1&lt;BR /&gt;
disabled = false&lt;BR /&gt;
EXTRACT-MTI = (?P&amp;lt;\w+\s+\w+="0"\s+\w+="\d+"/&amp;gt;)&lt;BR /&gt;
EXTRACT-AMOUNT = (?P&amp;lt;\w+\s+\w+="4"\s+\w+="\d+"/&amp;gt;)&lt;BR /&gt;
EXTRACT-NSU = (?P&amp;lt;\w+\s+\w+="7"\s+\w+="\d+"/&amp;gt;)&lt;BR /&gt;
EXTRACT-EC = (?P&amp;lt;\w+\s+\w+="42"\s+\w+="\d+"/&amp;gt;)&lt;BR /&gt;
EXTRACT-Terminal_ID = (?P&amp;lt;\w+\s+\w+="41"\s+\w+="\d+"/&amp;gt;)&lt;BR /&gt;
EXTRACT-DE11_NSU = (?P&amp;lt;\w+\s+\w+="11"\s+\w+="\d+"/&amp;gt;)&lt;BR /&gt;
EXTRACT-RRN = (?P&amp;lt;\w+\s+\w+="37"\s+\w+="\d+"/&amp;gt;)&lt;BR /&gt;
EXTRACT-Auth_Code = (?P&amp;lt;\w+\s+\w+="38"\s+\w+="\d*\w*"/&amp;gt;)&lt;BR /&gt;
EXTRACT-Resp_Code = (?P&amp;lt;\w+\s+\w+="39"\s+\w+="\d+"/&amp;gt;)&lt;BR /&gt;
EXTRACT-Track_2 = (?P)&lt;/P&gt;</description>
      <pubDate>Tue, 29 Sep 2020 14:03:17 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Why-has-Splunk-stopped-real-time-monitoring-of-log-files/m-p/373300#M67673</guid>
      <dc:creator>coronelfoca</dc:creator>
      <dc:date>2020-09-29T14:03:17Z</dc:date>
    </item>
    <item>
      <title>Re: Why has Splunk stopped real time monitoring of log files?</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Why-has-Splunk-stopped-real-time-monitoring-of-log-files/m-p/373301#M67674</link>
      <description>&lt;P&gt;What is the full path of this transforms.conf you posted?&lt;/P&gt;</description>
      <pubDate>Fri, 12 May 2017 15:26:01 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Why-has-Splunk-stopped-real-time-monitoring-of-log-files/m-p/373301#M67674</guid>
      <dc:creator>suarezry</dc:creator>
      <dc:date>2017-05-12T15:26:01Z</dc:date>
    </item>
    <item>
      <title>Re: Why has Splunk stopped real time monitoring of log files?</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Why-has-Splunk-stopped-real-time-monitoring-of-log-files/m-p/373302#M67675</link>
      <description>&lt;P&gt;Your error message was about host extraction.  This props.conf has nothing to do with host extraction. &lt;/P&gt;

&lt;P&gt;What is the full path to the transforms.conf you posted above?&lt;/P&gt;</description>
      <pubDate>Fri, 12 May 2017 15:30:56 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Why-has-Splunk-stopped-real-time-monitoring-of-log-files/m-p/373302#M67675</guid>
      <dc:creator>suarezry</dc:creator>
      <dc:date>2017-05-12T15:30:56Z</dc:date>
    </item>
    <item>
      <title>Re: Why has Splunk stopped real time monitoring of log files?</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Why-has-Splunk-stopped-real-time-monitoring-of-log-files/m-p/373303#M67676</link>
      <description>&lt;P&gt;The full path is "C:Program Files\Splunk\etc\system\default"&lt;/P&gt;</description>
      <pubDate>Fri, 12 May 2017 15:43:45 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Why-has-Splunk-stopped-real-time-monitoring-of-log-files/m-p/373303#M67676</guid>
      <dc:creator>coronelfoca</dc:creator>
      <dc:date>2017-05-12T15:43:45Z</dc:date>
    </item>
    <item>
      <title>Re: Why has Splunk stopped real time monitoring of log files?</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Why-has-Splunk-stopped-real-time-monitoring-of-log-files/m-p/373304#M67677</link>
      <description>&lt;P&gt;Ok, so that is the default configuration.  I don't think there would be a problem with those.  Is there any transforms.conf files in any of the C:Program Files\Splunk\etc...\local directories?&lt;/P&gt;</description>
      <pubDate>Fri, 12 May 2017 15:49:38 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Why-has-Splunk-stopped-real-time-monitoring-of-log-files/m-p/373304#M67677</guid>
      <dc:creator>suarezry</dc:creator>
      <dc:date>2017-05-12T15:49:38Z</dc:date>
    </item>
    <item>
      <title>Re: Why has Splunk stopped real time monitoring of log files?</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Why-has-Splunk-stopped-real-time-monitoring-of-log-files/m-p/373305#M67678</link>
      <description>&lt;P&gt;C:\Program Files\Splunk\etc\apps\splunk_monitoring_console\default&lt;BR /&gt;
C:\Program Files\Splunk\etc\apps\search\default&lt;BR /&gt;
C:\Program Files\Splunk\etc\apps\simple_xml_example....&lt;/P&gt;</description>
      <pubDate>Tue, 29 Sep 2020 14:03:51 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Why-has-Splunk-stopped-real-time-monitoring-of-log-files/m-p/373305#M67678</guid>
      <dc:creator>coronelfoca</dc:creator>
      <dc:date>2020-09-29T14:03:51Z</dc:date>
    </item>
    <item>
      <title>Re: Why has Splunk stopped real time monitoring of log files?</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Why-has-Splunk-stopped-real-time-monitoring-of-log-files/m-p/373306#M67679</link>
      <description>&lt;P&gt;only at those ones&lt;/P&gt;</description>
      <pubDate>Fri, 12 May 2017 20:35:57 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Why-has-Splunk-stopped-real-time-monitoring-of-log-files/m-p/373306#M67679</guid>
      <dc:creator>coronelfoca</dc:creator>
      <dc:date>2017-05-12T20:35:57Z</dc:date>
    </item>
  </channel>
</rss>

