<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: inputs.conf whitelist regex issue on message field in Splunk Search</title>
    <link>https://community.splunk.com/t5/Splunk-Search/inputs-conf-whitelist-regex-issue-on-message-field/m-p/470926#M132480</link>
    <description>&lt;P&gt;I changed the regex and followed gcusello's advice, this worked like a charm (use the same regex for field extrations) :&lt;/P&gt;

&lt;P&gt;:: props.conf ::&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;[c-icap]
DATETIME_CONFIG = 
NO_BINARY_CHECK = true
category = Custom
description = squiclamav
disabled = false
pulldown_type = true
TRANSFORMS-set= setnull,setparsing
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;:: Transforms.conf ::&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;[setparsing]
REGEX=(.*Location.*http:\/\/example\.com\/cgi-bin\/clwarn\.cgi\?url=(?P&amp;lt;url&amp;gt;.*)\?X-Amz-Algorithm.*source=(?P&amp;lt;src_ip&amp;gt;[0-9\.]*).*stream:\s(?P&amp;lt;threat_name&amp;gt;[a-zA-Z0-9\-._]+).*)
DEST_KEY=queue
FORMAT=indexQueue
&lt;/CODE&gt;&lt;/PRE&gt;</description>
    <pubDate>Thu, 04 Jun 2020 11:58:12 GMT</pubDate>
    <dc:creator>williamhardykim</dc:creator>
    <dc:date>2020-06-04T11:58:12Z</dc:date>
    <item>
      <title>inputs.conf whitelist regex issue on message field</title>
      <link>https://community.splunk.com/t5/Splunk-Search/inputs-conf-whitelist-regex-issue-on-message-field/m-p/470922#M132476</link>
      <description>&lt;P&gt;I am unable to whitelist input, I do not understand why, my Splunk is ingesting data from a c-icap server logfile and I only want to keep these logs (the ones with Anti-Virus Hit's), here is my inputs.conf file:&lt;/P&gt;
&lt;PRE&gt;&lt;CODE&gt;[monitor:///var/log/c-icap/server.log]
disabled = false
sourcetype = c-icap

whitelist= Message = ".*DEBUG.*Clamd.*FOUND.*"
&lt;/CODE&gt;&lt;/PRE&gt;
&lt;P&gt;This is the type of log I want to allow into Splunk, my regex works fine, I have tested it, it is unclear what key/field name I should be using, I also tried "Event" instead of "Message" without success:&lt;/P&gt;
&lt;PRE&gt;&lt;CODE&gt;Wed Jun  3 17:04:06 2020, 24488/1744570112, squidclamav.c(861) squidclamav_end_of_data_handler: Wed Jun  3 17:04:06 2020, 24488/1744570112, DEBUG received from Clamd: stream: Win.Trojan.Powershell-7007230-0 FOUND
&lt;/CODE&gt;&lt;/PRE&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="alt text"&gt;&lt;img src="https://community.splunk.com/t5/image/serverpage/image-id/9029iCC3C5453644A8702/image-size/large?v=v2&amp;amp;px=999" role="button" title="alt text" alt="alt text" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;PS: I am using the free version of Splunk.&lt;/P&gt;</description>
      <pubDate>Mon, 08 Jun 2020 17:55:39 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/inputs-conf-whitelist-regex-issue-on-message-field/m-p/470922#M132476</guid>
      <dc:creator>williamhardykim</dc:creator>
      <dc:date>2020-06-08T17:55:39Z</dc:date>
    </item>
    <item>
      <title>Re: inputs.conf whitelist regex issue on message field</title>
      <link>https://community.splunk.com/t5/Splunk-Search/inputs-conf-whitelist-regex-issue-on-message-field/m-p/470923#M132477</link>
      <description>&lt;P&gt;Hi @williamhardykimber,&lt;BR /&gt;
as you can read at &lt;A href="https://docs.splunk.com/Documentation/Splunk/latest/Admin/Inputsconf"&gt;https://docs.splunk.com/Documentation/Splunk/latest/Admin/Inputsconf&lt;/A&gt; , the whitelist option permits to filter the filenames to input not to filter the events and anyway it takes only regexes not strings like your.&lt;/P&gt;

&lt;P&gt;In Splunk it's possible to filter events on Indexers or (when present) on Heavy Forwarders, not on Universal Forwarders, with the only exception of Windows EventLogs.&lt;/P&gt;

&lt;P&gt;So if you want to filter events you have to follow instructions at &lt;A href="https://docs.splunk.com/Documentation/SplunkCloud/8.0.2004/Forwarding/Routeandfilterdatad#Filter_event_data_and_send_to_queues"&gt;https://docs.splunk.com/Documentation/SplunkCloud/8.0.2004/Forwarding/Routeandfilterdatad#Filter_event_data_and_send_to_queues&lt;/A&gt; .&lt;/P&gt;

&lt;P&gt;Ciao.&lt;BR /&gt;
Giuseppe&lt;/P&gt;</description>
      <pubDate>Thu, 04 Jun 2020 06:55:45 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/inputs-conf-whitelist-regex-issue-on-message-field/m-p/470923#M132477</guid>
      <dc:creator>gcusello</dc:creator>
      <dc:date>2020-06-04T06:55:45Z</dc:date>
    </item>
    <item>
      <title>Re: inputs.conf whitelist regex issue on message field</title>
      <link>https://community.splunk.com/t5/Splunk-Search/inputs-conf-whitelist-regex-issue-on-message-field/m-p/470924#M132478</link>
      <description>&lt;P&gt;Interesting, something like this ?&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;Edit props.conf and add the following:
[c-icap]
TRANSFORMS-icap=icapnull

Edit transforms.conf and add the following:
[icapnull]
REGEX=(.*DEBUG.*Clamd.*FOUND.*)
DEST_KEY=queue
FORMAT=nullQueue
&lt;/CODE&gt;&lt;/PRE&gt;</description>
      <pubDate>Thu, 04 Jun 2020 07:56:22 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/inputs-conf-whitelist-regex-issue-on-message-field/m-p/470924#M132478</guid>
      <dc:creator>williamhardykim</dc:creator>
      <dc:date>2020-06-04T07:56:22Z</dc:date>
    </item>
    <item>
      <title>Re: inputs.conf whitelist regex issue on message field</title>
      <link>https://community.splunk.com/t5/Splunk-Search/inputs-conf-whitelist-regex-issue-on-message-field/m-p/470925#M132479</link>
      <description>&lt;P&gt;Hi @williamhardykimber,&lt;BR /&gt;
yes, you can check the regex also in Splunk using the regex command&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;your search
| regex ".*DEBUG.*Clamd.*FOUND.*"
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;Ciao.&lt;BR /&gt;
Giuseppe&lt;/P&gt;</description>
      <pubDate>Thu, 04 Jun 2020 11:22:48 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/inputs-conf-whitelist-regex-issue-on-message-field/m-p/470925#M132479</guid>
      <dc:creator>gcusello</dc:creator>
      <dc:date>2020-06-04T11:22:48Z</dc:date>
    </item>
    <item>
      <title>Re: inputs.conf whitelist regex issue on message field</title>
      <link>https://community.splunk.com/t5/Splunk-Search/inputs-conf-whitelist-regex-issue-on-message-field/m-p/470926#M132480</link>
      <description>&lt;P&gt;I changed the regex and followed gcusello's advice, this worked like a charm (use the same regex for field extrations) :&lt;/P&gt;

&lt;P&gt;:: props.conf ::&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;[c-icap]
DATETIME_CONFIG = 
NO_BINARY_CHECK = true
category = Custom
description = squiclamav
disabled = false
pulldown_type = true
TRANSFORMS-set= setnull,setparsing
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;:: Transforms.conf ::&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;[setparsing]
REGEX=(.*Location.*http:\/\/example\.com\/cgi-bin\/clwarn\.cgi\?url=(?P&amp;lt;url&amp;gt;.*)\?X-Amz-Algorithm.*source=(?P&amp;lt;src_ip&amp;gt;[0-9\.]*).*stream:\s(?P&amp;lt;threat_name&amp;gt;[a-zA-Z0-9\-._]+).*)
DEST_KEY=queue
FORMAT=indexQueue
&lt;/CODE&gt;&lt;/PRE&gt;</description>
      <pubDate>Thu, 04 Jun 2020 11:58:12 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/inputs-conf-whitelist-regex-issue-on-message-field/m-p/470926#M132480</guid>
      <dc:creator>williamhardykim</dc:creator>
      <dc:date>2020-06-04T11:58:12Z</dc:date>
    </item>
  </channel>
</rss>

