<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Ignore Events from Mutiple Sources in Splunk Search</title>
    <link>https://community.splunk.com/t5/Splunk-Search/Ignore-Events-from-Mutiple-Sources/m-p/114746#M183836</link>
    <description>&lt;P&gt;Try the FULL PATH with literal filename (no RegEx) and work backwards from there.&lt;/P&gt;</description>
    <pubDate>Wed, 20 May 2015 16:43:10 GMT</pubDate>
    <dc:creator>woodcock</dc:creator>
    <dc:date>2015-05-20T16:43:10Z</dc:date>
    <item>
      <title>Ignore Events from Mutiple Sources</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Ignore-Events-from-Mutiple-Sources/m-p/114740#M183830</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;

&lt;P&gt;I have multiple sources to one sourcetype.  I'm trying to drop events and my props and transforms work fine by the sourcetype. However, I want to have different rules by sourcetype.&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;in Props.conf

[source::MyLogService*.log] 
TRANSFORMS-grtrash2 = eliminate-debug

in Transform.conf

[eliminate-debug]
REGEX = (?m)-\s*DEBUG\s*-
DEST_KEY = queue
FORMAT = nullQueue
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;I've tried different combinations of defining the "source" and props.conf and nothing is working.  Real source looks like:&lt;BR /&gt;
\server\logfolder\MyLogService150520-01.log&lt;/P&gt;

&lt;P&gt;Any ideas?&lt;/P&gt;

&lt;P&gt;Thank you!&lt;/P&gt;

&lt;P&gt;Chris&lt;/P&gt;</description>
      <pubDate>Wed, 20 May 2015 10:32:30 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Ignore-Events-from-Mutiple-Sources/m-p/114740#M183830</guid>
      <dc:creator>chrisboy68</dc:creator>
      <dc:date>2015-05-20T10:32:30Z</dc:date>
    </item>
    <item>
      <title>Re: Ignore Events from Mutiple Sources</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Ignore-Events-from-Mutiple-Sources/m-p/114741#M183831</link>
      <description>&lt;P&gt;I also changed the source to a  full regex. Tested the regex is working correctly. Still not applying the Transforms. I can only get the Transforms to work by using the the sourcetype, baffled with source is not working.&lt;/P&gt;

&lt;P&gt;In Props:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;[source::.server\d+.folder\$.MyLogService\d+-\d+\.log]  
TRANSFORMS-grtrash = setnull , setparsing, badError, badError2
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;The source:&lt;BR /&gt;
\server001\folder$\MyLogService150515-03.log&lt;/P&gt;

&lt;P&gt;Thanks&lt;/P&gt;

&lt;P&gt;Chris&lt;/P&gt;</description>
      <pubDate>Wed, 20 May 2015 13:47:33 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Ignore-Events-from-Mutiple-Sources/m-p/114741#M183831</guid>
      <dc:creator>chrisboy68</dc:creator>
      <dc:date>2015-05-20T13:47:33Z</dc:date>
    </item>
    <item>
      <title>Re: Ignore Events from Mutiple Sources</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Ignore-Events-from-Mutiple-Sources/m-p/114742#M183832</link>
      <description>&lt;P&gt;Your RegEx is wrong:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;[source::.*server\d+folder\$MyLogService\d+-\d+\.log]
&lt;/CODE&gt;&lt;/PRE&gt;</description>
      <pubDate>Wed, 20 May 2015 14:12:21 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Ignore-Events-from-Mutiple-Sources/m-p/114742#M183832</guid>
      <dc:creator>woodcock</dc:creator>
      <dc:date>2015-05-20T14:12:21Z</dc:date>
    </item>
    <item>
      <title>Re: Ignore Events from Mutiple Sources</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Ignore-Events-from-Mutiple-Sources/m-p/114743#M183833</link>
      <description>&lt;P&gt;Thanks, I tried that and its still not working. This was a typo with me masking the real text. I validate my regex here: &lt;A href="https://regex101.com/#python"&gt;https://regex101.com/#python&lt;/A&gt; to make sure my entire source is captured. &lt;/P&gt;

&lt;P&gt;Baffled....&lt;/P&gt;

&lt;P&gt;Chris&lt;/P&gt;</description>
      <pubDate>Wed, 20 May 2015 14:52:45 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Ignore-Events-from-Mutiple-Sources/m-p/114743#M183833</guid>
      <dc:creator>chrisboy68</dc:creator>
      <dc:date>2015-05-20T14:52:45Z</dc:date>
    </item>
    <item>
      <title>Re: Ignore Events from Mutiple Sources</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Ignore-Events-from-Mutiple-Sources/m-p/114744#M183834</link>
      <description>&lt;P&gt;The documentation says this:&lt;/P&gt;

&lt;P&gt;Match expressions must match the entire name, not just a substring. If you are familiar&lt;BR /&gt;
with regular expressions, match expressions are based on a full implementation of PCRE with the&lt;BR /&gt;
translation of ..., * and . Thus . matches a period, * matches non-directory separators,&lt;BR /&gt;
and ... matches any number of any characters.&lt;/P&gt;

&lt;P&gt;For more information see the wildcards section at:&lt;BR /&gt;
&lt;A href="http://docs.splunk.com/Documentation/Splunk/latest/Data/Specifyinputpathswithwildcards"&gt;http://docs.splunk.com/Documentation/Splunk/latest/Data/Specifyinputpathswithwildcards&lt;/A&gt;&lt;/P&gt;

&lt;P&gt;And the referenced like says this:&lt;/P&gt;

&lt;P&gt;Important: Input path specifications in inputs.conf don't use regular expressions (regexes) but rather Splunk-defined wildcards.&lt;/P&gt;

&lt;P&gt;So I think it needs to be like this:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt; [source::.../server\d+folder\$MyLogService\d+-\d+\.log]
&lt;/CODE&gt;&lt;/PRE&gt;</description>
      <pubDate>Wed, 20 May 2015 15:12:48 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Ignore-Events-from-Mutiple-Sources/m-p/114744#M183834</guid>
      <dc:creator>woodcock</dc:creator>
      <dc:date>2015-05-20T15:12:48Z</dc:date>
    </item>
    <item>
      <title>Re: Ignore Events from Mutiple Sources</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Ignore-Events-from-Mutiple-Sources/m-p/114745#M183835</link>
      <description>&lt;P&gt;Driving me batty,&lt;/P&gt;

&lt;P&gt;With the source name of :&lt;BR /&gt;
\server001\folder$\MyLogService150515-03.log&lt;/P&gt;

&lt;P&gt;I did:&lt;BR /&gt;
[source::\\server001\folder$\MyLogService*.log]&lt;/P&gt;

&lt;P&gt;Still no go. grrr.&lt;/P&gt;

&lt;P&gt;Chris&lt;/P&gt;</description>
      <pubDate>Wed, 20 May 2015 16:39:48 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Ignore-Events-from-Mutiple-Sources/m-p/114745#M183835</guid>
      <dc:creator>chrisboy68</dc:creator>
      <dc:date>2015-05-20T16:39:48Z</dc:date>
    </item>
    <item>
      <title>Re: Ignore Events from Mutiple Sources</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Ignore-Events-from-Mutiple-Sources/m-p/114746#M183836</link>
      <description>&lt;P&gt;Try the FULL PATH with literal filename (no RegEx) and work backwards from there.&lt;/P&gt;</description>
      <pubDate>Wed, 20 May 2015 16:43:10 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Ignore-Events-from-Mutiple-Sources/m-p/114746#M183836</guid>
      <dc:creator>woodcock</dc:creator>
      <dc:date>2015-05-20T16:43:10Z</dc:date>
    </item>
  </channel>
</rss>

