<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Regex is kicking my butt in Splunk Search</title>
    <link>https://community.splunk.com/t5/Splunk-Search/Regex-is-kicking-my-butt/m-p/59507#M14661</link>
    <description>&lt;P&gt;The problem lies in how you name/define the transform. In &lt;CODE&gt;props.conf&lt;/CODE&gt;, you call for two transforms to take place. But these are not found in &lt;CODE&gt;transforms.conf&lt;/CODE&gt;. Also, for wineventlogs, you do not need to do &lt;CODE&gt;source::&lt;/CODE&gt; in props.&lt;/P&gt;

&lt;P&gt;And you don't need the &lt;CODE&gt;setparsing&lt;/CODE&gt; transform either. From the example in the docs, that is used when you want discard all events (to the nullQueue), and then change back to the parsingQueue for those events that match the regex.&lt;/P&gt;

&lt;P&gt;Try this instead.&lt;/P&gt;

&lt;P&gt;props.conf&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;[WinEventLog:Security] 
TRANSFORMS-set=setnull
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;transforms.conf&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;[setnull] 
REGEX = (?m)EventCode=5156 
DEST_KEY = queue 
FORMAT = nullQueue
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;Hope this helps,&lt;/P&gt;

&lt;P&gt;K&lt;/P&gt;</description>
    <pubDate>Tue, 11 Jun 2013 11:46:37 GMT</pubDate>
    <dc:creator>kristian_kolb</dc:creator>
    <dc:date>2013-06-11T11:46:37Z</dc:date>
    <item>
      <title>Regex is kicking my butt</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Regex-is-kicking-my-butt/m-p/59505#M14659</link>
      <description>&lt;P&gt;So I'm attempting to drop events from the windows security logs at the indexer so I've created a props.conf that is this:&lt;/P&gt;

&lt;P&gt;&lt;CODE&gt;&lt;BR /&gt;
[source::WinEventLog:Security]&lt;BR /&gt;
TRANSFORMS-set=setnull, setparsing&lt;BR /&gt;
&lt;/CODE&gt;&lt;BR /&gt;
and my transforms.conf is:&lt;/P&gt;

&lt;P&gt;&lt;CODE&gt;&lt;/CODE&gt;&lt;/P&gt;

&lt;H1&gt;Exclude windows events&lt;/H1&gt;

&lt;P&gt;[WinEventLog:Security]&lt;BR /&gt;
REGEX = (?m) EventCode=(5156).&lt;BR /&gt;
DEST_KEY = queue&lt;BR /&gt;
FORMAT = nullQueue&lt;BR /&gt;
&lt;/P&gt;

&lt;P&gt;So I'm a Splunk newbie and have struggled/searched/restarted my test instance countless times with still no success.  These conf files are in the /opt/splunk/etc/system/local/ and I've yet to even get one event to hit the null queue???  Help!!! thanks in advance&lt;/P&gt;</description>
      <pubDate>Tue, 11 Jun 2013 11:11:36 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Regex-is-kicking-my-butt/m-p/59505#M14659</guid>
      <dc:creator>cdupuis123</dc:creator>
      <dc:date>2013-06-11T11:11:36Z</dc:date>
    </item>
    <item>
      <title>Re: Regex is kicking my butt</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Regex-is-kicking-my-butt/m-p/59506#M14660</link>
      <description>&lt;P&gt;Hello&lt;/P&gt;

&lt;P&gt;EDITED:&lt;/P&gt;

&lt;P&gt;Follow Kristian answer...&lt;/P&gt;

&lt;P&gt;Regards&lt;/P&gt;</description>
      <pubDate>Tue, 11 Jun 2013 11:35:56 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Regex-is-kicking-my-butt/m-p/59506#M14660</guid>
      <dc:creator>gfuente</dc:creator>
      <dc:date>2013-06-11T11:35:56Z</dc:date>
    </item>
    <item>
      <title>Re: Regex is kicking my butt</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Regex-is-kicking-my-butt/m-p/59507#M14661</link>
      <description>&lt;P&gt;The problem lies in how you name/define the transform. In &lt;CODE&gt;props.conf&lt;/CODE&gt;, you call for two transforms to take place. But these are not found in &lt;CODE&gt;transforms.conf&lt;/CODE&gt;. Also, for wineventlogs, you do not need to do &lt;CODE&gt;source::&lt;/CODE&gt; in props.&lt;/P&gt;

&lt;P&gt;And you don't need the &lt;CODE&gt;setparsing&lt;/CODE&gt; transform either. From the example in the docs, that is used when you want discard all events (to the nullQueue), and then change back to the parsingQueue for those events that match the regex.&lt;/P&gt;

&lt;P&gt;Try this instead.&lt;/P&gt;

&lt;P&gt;props.conf&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;[WinEventLog:Security] 
TRANSFORMS-set=setnull
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;transforms.conf&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;[setnull] 
REGEX = (?m)EventCode=5156 
DEST_KEY = queue 
FORMAT = nullQueue
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;Hope this helps,&lt;/P&gt;

&lt;P&gt;K&lt;/P&gt;</description>
      <pubDate>Tue, 11 Jun 2013 11:46:37 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Regex-is-kicking-my-butt/m-p/59507#M14661</guid>
      <dc:creator>kristian_kolb</dc:creator>
      <dc:date>2013-06-11T11:46:37Z</dc:date>
    </item>
    <item>
      <title>Re: Regex is kicking my butt</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Regex-is-kicking-my-butt/m-p/59508#M14662</link>
      <description>&lt;P&gt;Awesome, thanks Kristian&lt;/P&gt;

&lt;P&gt;Now to add other events I just | them correct?&lt;/P&gt;</description>
      <pubDate>Tue, 11 Jun 2013 12:10:45 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Regex-is-kicking-my-butt/m-p/59508#M14662</guid>
      <dc:creator>cdupuis123</dc:creator>
      <dc:date>2013-06-11T12:10:45Z</dc:date>
    </item>
    <item>
      <title>Re: Regex is kicking my butt</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Regex-is-kicking-my-butt/m-p/59509#M14663</link>
      <description>&lt;P&gt;Awesome, thanks Kristian&lt;/P&gt;</description>
      <pubDate>Tue, 11 Jun 2013 12:29:43 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Regex-is-kicking-my-butt/m-p/59509#M14663</guid>
      <dc:creator>cdupuis123</dc:creator>
      <dc:date>2013-06-11T12:29:43Z</dc:date>
    </item>
    <item>
      <title>Re: Regex is kicking my butt</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Regex-is-kicking-my-butt/m-p/59510#M14664</link>
      <description>&lt;P&gt;Yes. (5125|4267|1337) etc&lt;/P&gt;

&lt;P&gt;I don't know if there is a risk that you'll match 5-digit EventCodes by accident, i.e. 1234 could also match 12345 Might want to add &lt;CODE&gt;\b&lt;/CODE&gt; at the end of your string.&lt;/P&gt;

&lt;P&gt;&lt;CODE&gt;REGEX=(?m)EventCode=(1234|3456|6789)\b&lt;/CODE&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 11 Jun 2013 14:04:25 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Regex-is-kicking-my-butt/m-p/59510#M14664</guid>
      <dc:creator>kristian_kolb</dc:creator>
      <dc:date>2013-06-11T14:04:25Z</dc:date>
    </item>
    <item>
      <title>Re: Regex is kicking my butt</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Regex-is-kicking-my-butt/m-p/59511#M14665</link>
      <description>&lt;P&gt;Any idea why this stopped working?  Where do I start troubleshooting?&lt;/P&gt;</description>
      <pubDate>Thu, 11 Jul 2013 15:49:05 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Regex-is-kicking-my-butt/m-p/59511#M14665</guid>
      <dc:creator>cdupuis123</dc:creator>
      <dc:date>2013-07-11T15:49:05Z</dc:date>
    </item>
    <item>
      <title>Re: Regex is kicking my butt</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Regex-is-kicking-my-butt/m-p/59512#M14666</link>
      <description>&lt;P&gt;Would this need to go on a indexer or search head in a cluster? Does the dropped data count toward license?&lt;/P&gt;</description>
      <pubDate>Fri, 12 Jul 2013 00:36:15 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Regex-is-kicking-my-butt/m-p/59512#M14666</guid>
      <dc:creator>adrianathome</dc:creator>
      <dc:date>2013-07-12T00:36:15Z</dc:date>
    </item>
    <item>
      <title>Re: Regex is kicking my butt</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Regex-is-kicking-my-butt/m-p/59513#M14667</link>
      <description>&lt;P&gt;This operation takes place during the parsing phase. So the configuration must be on the first of the following in your chain from source log to indexed data; a Heavy Forwarder or an Indexer. See the following page;&lt;/P&gt;

&lt;P&gt;&lt;A href="http://wiki.splunk.com/Where_do_I_configure_my_Splunk_settings"&gt;http://wiki.splunk.com/Where_do_I_configure_my_Splunk_settings&lt;/A&gt;&lt;/P&gt;

&lt;P&gt;No, dropped data does not count towards the license.&lt;/P&gt;</description>
      <pubDate>Fri, 12 Jul 2013 12:42:58 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Regex-is-kicking-my-butt/m-p/59513#M14667</guid>
      <dc:creator>kristian_kolb</dc:creator>
      <dc:date>2013-07-12T12:42:58Z</dc:date>
    </item>
  </channel>
</rss>

