<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Including specific incoming data from monitored log files in Getting Data In</title>
    <link>https://community.splunk.com/t5/Getting-Data-In/Including-specific-incoming-data-from-monitored-log-files/m-p/504955#M86030</link>
    <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/161352"&gt;@gcusello&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I've renamed the sourcetype, replacing the ":" with "_"&lt;/P&gt;&lt;P&gt;That too had no effect.&lt;/P&gt;&lt;P&gt;I'm not sure what now.&lt;/P&gt;&lt;P&gt;Without the props and transforms, all the logs come in. The regex works when run in the search query.&lt;/P&gt;&lt;P&gt;With the&amp;nbsp;props and transforms, I get no logs.&lt;/P&gt;&lt;P&gt;Does the regex in the transforms.conf look right?&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;[setnull]
REGEX = .
DEST_KEY = queue
FORMAT = nullQueue

[setparsing]
REGEX = (?i)(\bkeyword1\b).*(\bkeyword2\b.*\])(?i)
DEST_KEY = queue
FORMAT = indexQueue&lt;/LI-CODE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Thu, 18 Jun 2020 12:12:59 GMT</pubDate>
    <dc:creator>geoffmoraes</dc:creator>
    <dc:date>2020-06-18T12:12:59Z</dc:date>
    <item>
      <title>Including specific incoming data from monitored log files</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Including-specific-incoming-data-from-monitored-log-files/m-p/504800#M86011</link>
      <description>&lt;P&gt;I am attempting to index just a few interesting events from an application's log files. These are unstructured text files. I do not want to index the entire log files, as those are at least 400MB per file. The events that I want to extract may not even add up to 4MB per day.&lt;/P&gt;&lt;P&gt;If I run a search with regex on the complete logs that were already indexed in a test run, I get just the required events.&lt;/P&gt;&lt;P&gt;So this works..&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;index=someindex sourcetype=somesourcetype 
| regex _raw="my_regex_to_look_for_specific_text"&lt;/LI-CODE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;But when I add the same regex as a whitelist for future events, it does not index any new logs at all. If I take off the whitelist, the logs come in.&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;[monitor://E:\Program Files\some app\Logs\...\servername_LOGTYPE_*.txt]
disabled=0
index=someindex
sourcetype=somesourcetype
renderXml=false
whitelist1 = _raw = "my_regex_to_look_for_specific_text"&lt;/LI-CODE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The documentation seems to covers lot on whitelisting file names, and not content within the files. &lt;A href="https://docs.splunk.com/Documentation/Splunk/8.0.4/Data/Whitelistorblacklistspecificincomingdata" target="_blank"&gt;https://docs.splunk.com/Documentation/Splunk/8.0.4/Data/Whitelistorblacklistspecificincomingdata &lt;/A&gt;&lt;/P&gt;&lt;P&gt;The only piece relevant to what I'm attempting to do is an example to blacklist the EventCode field with the value 4622.&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;[WinEventLog:Security]
blacklist1 = EventCode = "4662" Message = "Account Name:\s+(example account)"&lt;/LI-CODE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The only difference I can see is that my logs are unstructured and do not have fields parsed by splunk. So that leaves me with _raw as a field for my whitelist.&lt;/P&gt;&lt;P&gt;Is there a way to do the whitelisting of specific content in the _raw field? Or any other way?&lt;/P&gt;</description>
      <pubDate>Wed, 17 Jun 2020 13:54:46 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Including-specific-incoming-data-from-monitored-log-files/m-p/504800#M86011</guid>
      <dc:creator>geoffmoraes</dc:creator>
      <dc:date>2020-06-17T13:54:46Z</dc:date>
    </item>
    <item>
      <title>Re: Including specific incoming data from monitored log files</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Including-specific-incoming-data-from-monitored-log-files/m-p/504805#M86012</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/185584"&gt;@geoffmoraes&lt;/a&gt;&amp;nbsp;,&lt;/P&gt;&lt;P&gt;whitelist parameter is related to the name of the files to ingest, not to the events (&lt;A href="https://docs.splunk.com/Documentation/Splunk/8.0.4/Admin/Inputsconf" target="_blank"&gt;https://docs.splunk.com/Documentation/Splunk/8.0.4/Admin/Inputsconf&lt;/A&gt;).&lt;/P&gt;&lt;P&gt;It isn't possible to filter events at Forwarder level with the only exception of wineventlogs.&lt;/P&gt;&lt;P&gt;So if you want to filter data, you have to do this on Indexers or (when present) on Heavy Forwarders.&lt;/P&gt;&lt;P&gt;To do this, follow the instructions&amp;nbsp; at&amp;nbsp;&lt;A href="https://docs.splunk.com/Documentation/Splunk/8.0.4/Forwarding/Routeandfilterdatad#Filter_event_data_and_send_to_queues" target="_blank"&gt;https://docs.splunk.com/Documentation/Splunk/8.0.4/Forwarding/Routeandfilterdatad#Filter_event_data_and_send_to_queues&lt;/A&gt;&amp;nbsp;.&lt;/P&gt;&lt;P&gt;In few words, you have to find the correct regex (and you did it)&lt;/P&gt;&lt;P&gt;then put on Indexers (or when present on Heavy Forwarders) in props.conf:&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;[your_sourcetype]
TRANSFORMS-null= setnull&lt;/LI-CODE&gt;&lt;P&gt;in transforms.conf:&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;[setnull]
REGEX = my_regex_to_look_for_specific_text
DEST_KEY = queue
FORMAT = nullQueue&lt;/LI-CODE&gt;&lt;P&gt;Then restart Splunk&lt;/P&gt;&lt;P&gt;Ciao.&lt;/P&gt;&lt;P&gt;Giuseppe&lt;/P&gt;</description>
      <pubDate>Wed, 17 Jun 2020 14:21:45 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Including-specific-incoming-data-from-monitored-log-files/m-p/504805#M86012</guid>
      <dc:creator>gcusello</dc:creator>
      <dc:date>2020-06-17T14:21:45Z</dc:date>
    </item>
    <item>
      <title>Re: Including specific incoming data from monitored log files</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Including-specific-incoming-data-from-monitored-log-files/m-p/504806#M86013</link>
      <description>&lt;P&gt;You can only exclude files and directories within the monitor stanza on the UF. The WinEventLog example is for a pre-configured format that Splunk understands. This is why you are able to be more granular in the filtering.&lt;/P&gt;&lt;P&gt;Filtering can be done on the indexer.&lt;/P&gt;</description>
      <pubDate>Wed, 17 Jun 2020 14:23:34 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Including-specific-incoming-data-from-monitored-log-files/m-p/504806#M86013</guid>
      <dc:creator>boz_8058</dc:creator>
      <dc:date>2020-06-17T14:23:34Z</dc:date>
    </item>
    <item>
      <title>Re: Including specific incoming data from monitored log files</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Including-specific-incoming-data-from-monitored-log-files/m-p/504809#M86014</link>
      <description>&lt;P&gt;This filtering is being done on a heavy forwarder. I haven't tried your solution out yet, but have used the transforms.conf to send events&amp;nbsp; to null.&lt;/P&gt;&lt;P&gt;I would like to whitelist specific keywords so only those events are indexed. If I'm not mistaken, sending to null would be blacklisting that event.&amp;nbsp;Wouldn't this do the opposite of what I want?&lt;/P&gt;</description>
      <pubDate>Wed, 17 Jun 2020 14:34:56 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Including-specific-incoming-data-from-monitored-log-files/m-p/504809#M86014</guid>
      <dc:creator>geoffmoraes</dc:creator>
      <dc:date>2020-06-17T14:34:56Z</dc:date>
    </item>
    <item>
      <title>Re: Including specific incoming data from monitored log files</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Including-specific-incoming-data-from-monitored-log-files/m-p/504899#M86024</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/185584"&gt;@geoffmoraes&lt;/a&gt;&amp;nbsp;,&lt;/P&gt;&lt;P&gt;if you see in the above link there are two Use cases:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Discard specific events and keep the rest,&lt;/LI&gt;&lt;LI&gt;Keep specific events and discard the rest.&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;probably your is the second one (&amp;nbsp;&lt;A href="https://docs.splunk.com/Documentation/Splunk/8.0.4/Forwarding/Routeandfilterdatad#Keep_specific_events_and_discard_the_rest" target="_blank"&gt;https://docs.splunk.com/Documentation/Splunk/8.0.4/Forwarding/Routeandfilterdatad#Keep_specific_events_and_discard_the_rest&lt;/A&gt;&amp;nbsp;&lt;span class="lia-unicode-emoji" title=":disappointed_face:"&gt;😞&lt;/span&gt;&lt;/P&gt;&lt;P&gt;In props.conf&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;[your_sourcetype]
TRANSFORMS-set= setnull,setparsing&lt;/LI-CODE&gt;&lt;P&gt;&lt;EM&gt;(beware to the order of commands in TRANSFORMS-set!)&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;In transforms.conf&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;[setnull]
REGEX = .
DEST_KEY = queue
FORMAT = nullQueue

[setparsing]
REGEX = keyword1|keyword2|keyword3
DEST_KEY = queue
FORMAT = indexQueue&lt;/LI-CODE&gt;&lt;P&gt;&lt;EM&gt;(order isn't important!)&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;Ciao.&lt;/P&gt;&lt;P&gt;Giuseppe&lt;/P&gt;</description>
      <pubDate>Thu, 18 Jun 2020 06:47:37 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Including-specific-incoming-data-from-monitored-log-files/m-p/504899#M86024</guid>
      <dc:creator>gcusello</dc:creator>
      <dc:date>2020-06-18T06:47:37Z</dc:date>
    </item>
    <item>
      <title>Re: Including specific incoming data from monitored log files</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Including-specific-incoming-data-from-monitored-log-files/m-p/504909#M86026</link>
      <description>&lt;P&gt;Hi &lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/161352"&gt;@gcusello&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;So, in props I now have..&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;[source::some:sourcetype1]
TRANSFORMS-set= setnull,setparsing&lt;/LI-CODE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;and in transforms.conf&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;[setnull]
REGEX = .
DEST_KEY = queue
FORMAT = nullQueue

[setparsing]
REGEX = (?i)(\bkeyword1\b).*(\bkeyword2\b.*\])(?i)
DEST_KEY = queue
FORMAT = indexQueue&lt;/LI-CODE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;After saving these files on the HF, I've uninstalled and redeployed the app it via the Forwarder Management in the GUI.&lt;/P&gt;&lt;P&gt;So far it's not working, as I get all logs with no filtering.&lt;/P&gt;&lt;P&gt;This same regex on previously indexed events works on a search query, returning just the required events.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;index=someindex sourcetype=some:sourcetype1 | regex _raw="(?i)(\bkeyword1\b).*(\bkeyword2\b.*\])(?i)"&lt;/LI-CODE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Am I missing something?&lt;/P&gt;</description>
      <pubDate>Thu, 18 Jun 2020 07:39:45 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Including-specific-incoming-data-from-monitored-log-files/m-p/504909#M86026</guid>
      <dc:creator>geoffmoraes</dc:creator>
      <dc:date>2020-06-18T07:39:45Z</dc:date>
    </item>
    <item>
      <title>Re: Including specific incoming data from monitored log files</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Including-specific-incoming-data-from-monitored-log-files/m-p/504912#M86027</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/185584"&gt;@geoffmoraes&lt;/a&gt;&amp;nbsp;,&lt;/P&gt;&lt;P&gt;what's "&lt;STRONG&gt;source::some:sourcetype1&lt;/STRONG&gt;" in the props.conf stanza?&lt;/P&gt;&lt;P&gt;in this stanza name, you have to put the sourcetype of the logs to filter (e.g.: [wineventlog]).&lt;/P&gt;&lt;P&gt;Ciao.&lt;/P&gt;&lt;P&gt;Giuseppe&lt;/P&gt;</description>
      <pubDate>Thu, 18 Jun 2020 07:46:36 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Including-specific-incoming-data-from-monitored-log-files/m-p/504912#M86027</guid>
      <dc:creator>gcusello</dc:creator>
      <dc:date>2020-06-18T07:46:36Z</dc:date>
    </item>
    <item>
      <title>Re: Including specific incoming data from monitored log files</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Including-specific-incoming-data-from-monitored-log-files/m-p/504935#M86028</link>
      <description>&lt;P&gt;Hi &lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/161352"&gt;@gcusello&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I took that from the example on the docs link which had &lt;STRONG&gt;source::&lt;/STRONG&gt;&amp;nbsp; My mistake.&lt;/P&gt;&lt;P&gt;The actual sourcetype name has a : in it. I changed the props.conf to have&amp;nbsp;&lt;STRONG&gt;[some:sourcetype1]&amp;nbsp;&lt;/STRONG&gt;and still no luck. Not sure what's wrong this time.&lt;/P&gt;&lt;P&gt;Assuming that I eventually get this to work, can two sourcetypes be used in the props.conf like this?&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;props.conf &lt;/STRONG&gt;&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;[some:sourcetype1]
TRANSFORMS-set= setnull,setparsing1

[some:sourcetype2]
TRANSFORMS-set= setnull,setparsing2&lt;/LI-CODE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;transforms.conf&lt;/STRONG&gt;&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;[setnull]
REGEX = .
DEST_KEY = queue
FORMAT = nullQueue

[setparsing1]
REGEX = REGEX1
DEST_KEY = queue
FORMAT = indexQueue

[setparsing2]
REGEX = REGEX2
DEST_KEY = queue
FORMAT = indexQueue&lt;/LI-CODE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 18 Jun 2020 10:07:44 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Including-specific-incoming-data-from-monitored-log-files/m-p/504935#M86028</guid>
      <dc:creator>geoffmoraes</dc:creator>
      <dc:date>2020-06-18T10:07:44Z</dc:date>
    </item>
    <item>
      <title>Re: Including specific incoming data from monitored log files</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Including-specific-incoming-data-from-monitored-log-files/m-p/504940#M86029</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/185584"&gt;@geoffmoraes&lt;/a&gt;&amp;nbsp;,&lt;/P&gt;&lt;P&gt;let me understand: your sourcetype is called "some:sourcetype1" or it's only called "sourcetype1" and you inserted also "some:" in the stanza name?&lt;/P&gt;&lt;P&gt;If the first, try to change the name of the sourcetype avoiding to use ":" (use eventually "_") in "sourcetype1".&lt;/P&gt;&lt;P&gt;If the second, insert in the stanza name only "sourcetype1":&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;[sourcetype]&lt;/LI-CODE&gt;&lt;P&gt;Ciao.&lt;/P&gt;&lt;P&gt;Giuseppe&lt;/P&gt;</description>
      <pubDate>Thu, 18 Jun 2020 10:25:55 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Including-specific-incoming-data-from-monitored-log-files/m-p/504940#M86029</guid>
      <dc:creator>gcusello</dc:creator>
      <dc:date>2020-06-18T10:25:55Z</dc:date>
    </item>
    <item>
      <title>Re: Including specific incoming data from monitored log files</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Including-specific-incoming-data-from-monitored-log-files/m-p/504955#M86030</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/161352"&gt;@gcusello&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I've renamed the sourcetype, replacing the ":" with "_"&lt;/P&gt;&lt;P&gt;That too had no effect.&lt;/P&gt;&lt;P&gt;I'm not sure what now.&lt;/P&gt;&lt;P&gt;Without the props and transforms, all the logs come in. The regex works when run in the search query.&lt;/P&gt;&lt;P&gt;With the&amp;nbsp;props and transforms, I get no logs.&lt;/P&gt;&lt;P&gt;Does the regex in the transforms.conf look right?&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;[setnull]
REGEX = .
DEST_KEY = queue
FORMAT = nullQueue

[setparsing]
REGEX = (?i)(\bkeyword1\b).*(\bkeyword2\b.*\])(?i)
DEST_KEY = queue
FORMAT = indexQueue&lt;/LI-CODE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 18 Jun 2020 12:12:59 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Including-specific-incoming-data-from-monitored-log-files/m-p/504955#M86030</guid>
      <dc:creator>geoffmoraes</dc:creator>
      <dc:date>2020-06-18T12:12:59Z</dc:date>
    </item>
    <item>
      <title>Re: Including specific incoming data from monitored log files</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Including-specific-incoming-data-from-monitored-log-files/m-p/504961#M86031</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/185584"&gt;@geoffmoraes&lt;/a&gt;&amp;nbsp;,&lt;/P&gt;&lt;P&gt;you could have only three problems:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;the sourcetype of these logs isn't correct or is different from the one in props.conf;&lt;/LI&gt;&lt;LI&gt;the regex isn't correct;&lt;/LI&gt;&lt;LI&gt;the location of props and transforms files isn't correct.&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;You can easily check the first problem watching the sourcetype in the search results.&lt;/P&gt;&lt;P&gt;For the second, you could&amp;nbsp; use the regex command in a search.&lt;/P&gt;&lt;P&gt;For the third, these files must be on Indexers and/or (when present) on Heavy Forwarder;&amp;nbsp;to me more sure put in both and, after updating, Splunk must be restarted on the updated Splunk System.&lt;/P&gt;&lt;P&gt;Ciao.&lt;/P&gt;&lt;P&gt;Giuseppe&lt;/P&gt;</description>
      <pubDate>Thu, 18 Jun 2020 12:22:30 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Including-specific-incoming-data-from-monitored-log-files/m-p/504961#M86031</guid>
      <dc:creator>gcusello</dc:creator>
      <dc:date>2020-06-18T12:22:30Z</dc:date>
    </item>
    <item>
      <title>Re: Including specific incoming data from monitored log files</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Including-specific-incoming-data-from-monitored-log-files/m-p/505176#M86082</link>
      <description>&lt;P&gt;Thanks&amp;nbsp;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/161352"&gt;@gcusello&lt;/a&gt;!&amp;nbsp; I finally got it to work by taking off&amp;nbsp;&lt;STRONG&gt;renderXml=false&amp;nbsp;&lt;/STRONG&gt;from the stanza. The logs then came in filtered as expected!&lt;/P&gt;&lt;P&gt;But it isn't over yet. I need to add another sourcetype (which contains XML) to this index with the same kind of filtering. All I could find&amp;nbsp; relevant was this link below, but there isn't a clear solution.&lt;/P&gt;&lt;P&gt;Can &lt;STRONG&gt;setnull &lt;/STRONG&gt;and&amp;nbsp;&lt;STRONG&gt;setparsing&lt;/STRONG&gt; be used for two different sourcetypes?&lt;/P&gt;&lt;P&gt;&lt;A href="https://community.splunk.com/t5/Getting-Data-In/Using-setnull-and-setparsing-for-two-different-sourcetypes/td-p/404738" target="_blank"&gt;https://community.splunk.com/t5/Getting-Data-In/Using-setnull-and-setparsing-for-two-different-sourcetypes/td-p/404738&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 19 Jun 2020 12:22:26 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Including-specific-incoming-data-from-monitored-log-files/m-p/505176#M86082</guid>
      <dc:creator>geoffmoraes</dc:creator>
      <dc:date>2020-06-19T12:22:26Z</dc:date>
    </item>
    <item>
      <title>Re: Including specific incoming data from monitored log files</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Including-specific-incoming-data-from-monitored-log-files/m-p/505177#M86083</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/185584"&gt;@geoffmoraes&lt;/a&gt;&amp;nbsp;,&lt;/P&gt;&lt;P&gt;if the regex are the same you can use the same stanzas in transforms.conf, instead in props.conf you have to use two stanzas, one for each sourcetype.&lt;/P&gt;&lt;P&gt;If you have different regexes, you could create another stanza for the second setparsing (e.g. setparsing_xml) and use the same setnull.&lt;/P&gt;&lt;P&gt;Ciao.&lt;/P&gt;&lt;P&gt;Giuseppe&lt;/P&gt;</description>
      <pubDate>Fri, 19 Jun 2020 12:27:39 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Including-specific-incoming-data-from-monitored-log-files/m-p/505177#M86083</guid>
      <dc:creator>gcusello</dc:creator>
      <dc:date>2020-06-19T12:27:39Z</dc:date>
    </item>
    <item>
      <title>Re: Including specific incoming data from monitored log files</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Including-specific-incoming-data-from-monitored-log-files/m-p/505378#M86114</link>
      <description>&lt;P&gt;Thanks &lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/161352"&gt;@gcusello&lt;/a&gt; !&lt;/P&gt;</description>
      <pubDate>Sun, 21 Jun 2020 14:14:15 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Including-specific-incoming-data-from-monitored-log-files/m-p/505378#M86114</guid>
      <dc:creator>geoffmoraes</dc:creator>
      <dc:date>2020-06-21T14:14:15Z</dc:date>
    </item>
  </channel>
</rss>

