<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Cisco Config Regex in Splunk Search</title>
    <link>https://community.splunk.com/t5/Splunk-Search/Cisco-Config-Regex/m-p/423783#M121606</link>
    <description>&lt;P&gt;Before I begin work on what is likely to be a multi-day excursion, I wanted to see if this has already been done.&lt;/P&gt;

&lt;P&gt;I am importing Cisco switch and router startupconfigs into Splunk in hopes of setting up a dashboard that will help us track progress for some compliance items. Unfortunately, the config file is not formatted well, as it is coming from another application's database. It's a text file that is composed of the regular config with '\r\n' being used to show new lines.&lt;/P&gt;

&lt;P&gt;My goal is to get this parsed so that it shows individual interfaces as it's own field.&lt;/P&gt;

&lt;P&gt;Has anyone had any luck with this endeavor, or anything similar? I'd appreciate some guidance or feedback if you have.&lt;BR /&gt;
Thanks!&lt;/P&gt;</description>
    <pubDate>Wed, 06 Mar 2019 15:29:52 GMT</pubDate>
    <dc:creator>DBattisto</dc:creator>
    <dc:date>2019-03-06T15:29:52Z</dc:date>
    <item>
      <title>Cisco Config Regex</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Cisco-Config-Regex/m-p/423783#M121606</link>
      <description>&lt;P&gt;Before I begin work on what is likely to be a multi-day excursion, I wanted to see if this has already been done.&lt;/P&gt;

&lt;P&gt;I am importing Cisco switch and router startupconfigs into Splunk in hopes of setting up a dashboard that will help us track progress for some compliance items. Unfortunately, the config file is not formatted well, as it is coming from another application's database. It's a text file that is composed of the regular config with '\r\n' being used to show new lines.&lt;/P&gt;

&lt;P&gt;My goal is to get this parsed so that it shows individual interfaces as it's own field.&lt;/P&gt;

&lt;P&gt;Has anyone had any luck with this endeavor, or anything similar? I'd appreciate some guidance or feedback if you have.&lt;BR /&gt;
Thanks!&lt;/P&gt;</description>
      <pubDate>Wed, 06 Mar 2019 15:29:52 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Cisco-Config-Regex/m-p/423783#M121606</guid>
      <dc:creator>DBattisto</dc:creator>
      <dc:date>2019-03-06T15:29:52Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco Config Regex</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Cisco-Config-Regex/m-p/423784#M121607</link>
      <description>&lt;P&gt;Have you tried loading the file on to splunk via data Inputs? I am sure it will parse and if not, we can adjust the props.conf to line break your events.&lt;/P&gt;</description>
      <pubDate>Wed, 06 Mar 2019 16:52:01 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Cisco-Config-Regex/m-p/423784#M121607</guid>
      <dc:creator>lakshman239</dc:creator>
      <dc:date>2019-03-06T16:52:01Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco Config Regex</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Cisco-Config-Regex/m-p/423785#M121608</link>
      <description>&lt;P&gt;Are you suggesting loading the config file directly as an individual file? I'm getting thousands of them from a database, so manually adding isn't an option unfortunately.&lt;/P&gt;</description>
      <pubDate>Wed, 06 Mar 2019 19:20:40 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Cisco-Config-Regex/m-p/423785#M121608</guid>
      <dc:creator>DBattisto</dc:creator>
      <dc:date>2019-03-06T19:20:40Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco Config Regex</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Cisco-Config-Regex/m-p/423786#M121609</link>
      <description>&lt;P&gt;It sounds like a job for DBConnect:&lt;BR /&gt;
&lt;A href="https://splunkbase.splunk.com/app/2686/"&gt;https://splunkbase.splunk.com/app/2686/&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 07 Mar 2019 03:29:20 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Cisco-Config-Regex/m-p/423786#M121609</guid>
      <dc:creator>woodcock</dc:creator>
      <dc:date>2019-03-07T03:29:20Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco Config Regex</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Cisco-Config-Regex/m-p/423787#M121610</link>
      <description>&lt;P&gt;Its one off to test config and parsing and validate your config/events are seen properly. You can do this in dev and setup/tune props.conf to match your needs and then deploy them in prod.&lt;/P&gt;

&lt;P&gt;Alternately, you can use dbconnect as suggested by @woodcook&lt;/P&gt;</description>
      <pubDate>Thu, 07 Mar 2019 09:30:20 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Cisco-Config-Regex/m-p/423787#M121610</guid>
      <dc:creator>lakshman239</dc:creator>
      <dc:date>2019-03-07T09:30:20Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco Config Regex</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Cisco-Config-Regex/m-p/423788#M121611</link>
      <description>&lt;P&gt;Thanks for the suggestionm but perhaps I should add some context. I'm importing the configurations from SolarWinds, which is retrieved by writing a custom 'SWQL' (the SolarWinds Query Language &lt;EM&gt;eyeroll&lt;/EM&gt;) query.&lt;/P&gt;

&lt;P&gt;The configuration is stored as one column, meaning that it's not parsed out. How would I use dbconnect to help with this? I use dbconnect to import data from a different database already so it'd be interesting to hear what else I could be doing with it.&lt;/P&gt;</description>
      <pubDate>Thu, 07 Mar 2019 11:49:14 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Cisco-Config-Regex/m-p/423788#M121611</guid>
      <dc:creator>DBattisto</dc:creator>
      <dc:date>2019-03-07T11:49:14Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco Config Regex</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Cisco-Config-Regex/m-p/423789#M121612</link>
      <description>&lt;P&gt;I assume the database which you use isn't supported by Dbconnect yet.. you may want to check compatibility/support and take a call. &lt;A href="https://docs.splunk.com/Documentation/DBX/3.1.4/DeployDBX/Installdatabasedrivers#Supported_databases"&gt;https://docs.splunk.com/Documentation/DBX/3.1.4/DeployDBX/Installdatabasedrivers#Supported_databases&lt;/A&gt; &lt;/P&gt;</description>
      <pubDate>Thu, 07 Mar 2019 13:07:38 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Cisco-Config-Regex/m-p/423789#M121612</guid>
      <dc:creator>lakshman239</dc:creator>
      <dc:date>2019-03-07T13:07:38Z</dc:date>
    </item>
  </channel>
</rss>

