<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Filter IIS Logs with 80 and 443 in Splunk Search</title>
    <link>https://community.splunk.com/t5/Splunk-Search/How-to-filter-IIS-Logs-with-80-and-443/m-p/628827#M218437</link>
    <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/207926"&gt;@anandhalagaras1&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;you have to adapt the regex to this new requirement:&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;REGEX =  (GET|get)\s*\/\s*-\s*80|443&lt;/LI-CODE&gt;&lt;P&gt;if one answer solves your need, please accept one answer for the other people of Community or tell me how I can help you.&lt;/P&gt;&lt;P&gt;Ciao and happy splunking&lt;/P&gt;&lt;P&gt;Giuseppe&lt;/P&gt;&lt;P&gt;P.S.: Karma Points are appreciated &lt;span class="lia-unicode-emoji" title=":winking_face:"&gt;😉&lt;/span&gt;&lt;/P&gt;</description>
    <pubDate>Mon, 30 Jan 2023 13:06:06 GMT</pubDate>
    <dc:creator>gcusello</dc:creator>
    <dc:date>2023-01-30T13:06:06Z</dc:date>
    <item>
      <title>How to filter IIS Logs with 80 and 443?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-filter-IIS-Logs-with-80-and-443/m-p/627548#M218063</link>
      <description>&lt;P&gt;Hi Team,&lt;/P&gt;
&lt;P&gt;We have a requirement to filter out the events from the IIS logs if the event contains ""GET / - 80 -" OR "GET / - 443 -" in the logs before the ingestion.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;QUERY:&lt;/P&gt;
&lt;P&gt;index="*"&amp;nbsp; "GET / - 80 -" OR "GET / - 443 -"&lt;/P&gt;
&lt;P&gt;Sample Format:&lt;/P&gt;
&lt;P&gt;2022-12-12 00:38:10 xx.yyy.zzz.aaa GET / - 80 - xx.yyy.z.a - - x00 0 0 0&lt;/P&gt;
&lt;P&gt;&lt;SPAN class=""&gt;2022-12-12&lt;/SPAN&gt; &lt;SPAN class=""&gt;00:44:45&lt;/SPAN&gt; &lt;SPAN class=""&gt;xx.yyy.zzz.aaa&lt;/SPAN&gt; &lt;SPAN class=""&gt;&lt;SPAN class=""&gt;GET&lt;/SPAN&gt; &lt;SPAN class=""&gt;/&lt;/SPAN&gt; &lt;SPAN class=""&gt;-&lt;/SPAN&gt; &lt;SPAN class=""&gt;443&lt;/SPAN&gt; &lt;SPAN class=""&gt;-&lt;/SPAN&gt;&lt;/SPAN&gt; &lt;SPAN class=""&gt;xx.yyy.z.a&lt;/SPAN&gt;&amp;nbsp;&lt;SPAN class=""&gt;-&lt;/SPAN&gt; &lt;SPAN class=""&gt;-&lt;/SPAN&gt; &lt;SPAN class=""&gt;y00&lt;/SPAN&gt; &lt;SPAN class=""&gt;0&lt;/SPAN&gt; &lt;SPAN class=""&gt;0&lt;/SPAN&gt;&lt;SPAN&gt; x&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Hence kindly help with the relevant&amp;nbsp;props and transforms&amp;nbsp;for the same.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 19 Jan 2023 18:18:02 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-filter-IIS-Logs-with-80-and-443/m-p/627548#M218063</guid>
      <dc:creator>anandhalagaras1</dc:creator>
      <dc:date>2023-01-19T18:18:02Z</dc:date>
    </item>
    <item>
      <title>Re: Filter IIS Logs with 80 and 443</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-filter-IIS-Logs-with-80-and-443/m-p/627550#M218064</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/207926"&gt;@anandhalagaras1&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;let me understand: do you want to filter events before indexing (index time) or during searches (search time)?&lt;/P&gt;&lt;P&gt;in the first case you lose all the other logs and you cannot use them for other searches (e.g. finding errors).&lt;/P&gt;&lt;P&gt;In this case you can follow the instructions at&amp;nbsp;&lt;A href="https://docs.splunk.com/Documentation/Splunk/9.0.3/Forwarding/Routeandfilterdatad#Filter_event_data_and_send_to_queues" target="_blank"&gt;https://docs.splunk.com/Documentation/Splunk/9.0.3/Forwarding/Routeandfilterdatad#Filter_event_data_and_send_to_queues&lt;/A&gt;&lt;/P&gt;&lt;P&gt;in few words, in props.conf:&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;[your_sourcetype]
TRANSFORMS-set= setnull,setparsing&lt;/LI-CODE&gt;&lt;P&gt;in transforms.conf&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;[setnull]
REGEX = .
DEST_KEY = queue
FORMAT = nullQueue

[setparsing]
REGEX =  GET\s*\/\s*-\s*80|443
DEST_KEY = queue
FORMAT = indexQueue&lt;/LI-CODE&gt;&lt;P&gt;if you want to filter events at search time, in other words only in displaying data, your search is almost correct: I'd use parenthesis:&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;index="*"  ("GET / - 80 -" OR "GET / - 443 -")&lt;/LI-CODE&gt;&lt;P&gt;Ciao.&lt;/P&gt;&lt;P&gt;Giuseppe&lt;/P&gt;</description>
      <pubDate>Thu, 19 Jan 2023 07:28:12 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-filter-IIS-Logs-with-80-and-443/m-p/627550#M218064</guid>
      <dc:creator>gcusello</dc:creator>
      <dc:date>2023-01-19T07:28:12Z</dc:date>
    </item>
    <item>
      <title>Re: Filter IIS Logs with 80 and 443</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-filter-IIS-Logs-with-80-and-443/m-p/627554#M218065</link>
      <description>&lt;P&gt;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/161352"&gt;@gcusello&lt;/a&gt;&amp;nbsp;,&lt;/P&gt;&lt;P&gt;Thanks for your response.&lt;/P&gt;&lt;P&gt;Actually my query was not to ingest the logs if &lt;SPAN&gt;GET / - 80&amp;nbsp;&lt;/SPAN&gt;or &lt;SPAN&gt;&lt;SPAN class=""&gt;GET&amp;nbsp;/&amp;nbsp;-&amp;nbsp;443 is present in the IIS logs.&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;i.e. We&amp;nbsp;&lt;SPAN&gt;want to filter (ignore) the events before indexing (index time)&amp;nbsp;.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;And we are already ingesting the IIS logs into Splunk from the servers but if the below event is present in the logs for the sourcetype "xyz" then it needs to be filtered out i.e. it is not required to be ingested into Splunk itself.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;ie GET / - 80&amp;nbsp; or&amp;nbsp;&lt;SPAN class=""&gt;GET&amp;nbsp;/&amp;nbsp;-&amp;nbsp;443 is present&amp;nbsp;in the IIS logs then it is not required to be ingested into Splunk.&amp;nbsp;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;2022-12-12 00:38:10 xx.yyy.zzz.aaa GET / - 80 - xx.yyy.z.a - - x00 0 0 0&lt;/P&gt;&lt;P&gt;&lt;SPAN class=""&gt;2022-12-12&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN class=""&gt;00:44:45&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN class=""&gt;xx.yyy.zzz.aaa&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN class=""&gt;GET&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;/&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;-&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;443&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;-&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN class=""&gt;xx.yyy.z.a&lt;/SPAN&gt;&amp;nbsp;&lt;SPAN class=""&gt;-&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN class=""&gt;-&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN class=""&gt;y00&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN class=""&gt;0&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN class=""&gt;0&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;x&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Hence kindly help with the props and transforms for the same.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 19 Jan 2023 08:57:44 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-filter-IIS-Logs-with-80-and-443/m-p/627554#M218065</guid>
      <dc:creator>anandhalagaras1</dc:creator>
      <dc:date>2023-01-19T08:57:44Z</dc:date>
    </item>
    <item>
      <title>Re: Filter IIS Logs with 80 and 443</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-filter-IIS-Logs-with-80-and-443/m-p/627558#M218067</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/207926"&gt;@anandhalagaras1&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;as you can see in my previous answer, you have to put the props.conf and transfroms.conf in the Indexers or (if present) on intermediate Heavy Forwarders, not on Universal Forwarders.&lt;/P&gt;&lt;P&gt;in the props.conf you have to indicate your sourcetype and add the row of TRANSFORMATION and in the transforms.conf you have to insert the rows I shared using the correct regex.&lt;/P&gt;&lt;P&gt;The one I shared should be correct but, test it.&lt;/P&gt;&lt;P&gt;ciao.&lt;/P&gt;&lt;P&gt;Giuseppe&lt;/P&gt;</description>
      <pubDate>Thu, 19 Jan 2023 09:58:10 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-filter-IIS-Logs-with-80-and-443/m-p/627558#M218067</guid>
      <dc:creator>gcusello</dc:creator>
      <dc:date>2023-01-19T09:58:10Z</dc:date>
    </item>
    <item>
      <title>Re: Filter IIS Logs with 80 and 443</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-filter-IIS-Logs-with-80-and-443/m-p/627712#M218102</link>
      <description>&lt;P&gt;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/161352"&gt;@gcusello&lt;/a&gt;&amp;nbsp;, I used the below props and transforms in my Heavy Forwarder server to eliminate the logs if it contains&amp;nbsp;"GET / - 80 -"&amp;nbsp; or&amp;nbsp;"GET / - 443 -"&amp;nbsp; as you have provided but still i can see the events with GET / - 80 - and GET / - 443 - are still getting ingested into Splunk.&amp;nbsp;&lt;/P&gt;&lt;P&gt;So anything needs to be changed in props and transforms. Kindly let me know.&lt;/P&gt;&lt;P&gt;props.conf:&lt;BR /&gt;[sourcetype]&lt;BR /&gt;TRANSFORMS-set= setnull,setparsing&lt;/P&gt;&lt;P&gt;transforms.conf:&lt;BR /&gt;[setnull]&lt;BR /&gt;REGEX = GET\s*\/\s*-\s*80|443&lt;BR /&gt;DEST_KEY = queue&lt;BR /&gt;FORMAT = nullQueue&lt;/P&gt;&lt;P&gt;[setparsing]&lt;BR /&gt;REGEX = .&lt;BR /&gt;DEST_KEY = queue&lt;BR /&gt;FORMAT = indexQueue&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Also I have tried this props and transforms as well but still the same.&lt;/P&gt;&lt;P&gt;[sourcetype]&lt;BR /&gt;TRANSFORMS-null= setnull152,setnull153&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;[setnull152]&lt;BR /&gt;REGEX = GET\s*\/\s*-\s*80&lt;BR /&gt;DEST_KEY = queue&lt;BR /&gt;FORMAT = nullQueue&lt;/P&gt;&lt;P&gt;[setnull153]&lt;BR /&gt;REGEX = GET\s*\/\s*-\s*443&lt;BR /&gt;DEST_KEY = queue&lt;BR /&gt;FORMAT = nullQueue&lt;/P&gt;&lt;P&gt;But still its not working. Can you kindly help me.&lt;/P&gt;</description>
      <pubDate>Fri, 20 Jan 2023 09:41:50 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-filter-IIS-Logs-with-80-and-443/m-p/627712#M218102</guid>
      <dc:creator>anandhalagaras1</dc:creator>
      <dc:date>2023-01-20T09:41:50Z</dc:date>
    </item>
    <item>
      <title>Re: Filter IIS Logs with 80 and 443</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-filter-IIS-Logs-with-80-and-443/m-p/627716#M218105</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/207926"&gt;@anandhalagaras1&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;at first check the regexes in Splunk Search using the regex command.&lt;/P&gt;&lt;P&gt;Then One question: before the Heavy Forwarder where are located the conf files, are there other Heavy Forwarders?&lt;/P&gt;&lt;P&gt;I suppose that in the props.conf stanza header, you inserte the correct sourcetype value of the data source to filter.&lt;/P&gt;&lt;P&gt;Ciao.&lt;/P&gt;&lt;P&gt;Giuseppe&lt;/P&gt;</description>
      <pubDate>Fri, 20 Jan 2023 10:12:31 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-filter-IIS-Logs-with-80-and-443/m-p/627716#M218105</guid>
      <dc:creator>gcusello</dc:creator>
      <dc:date>2023-01-20T10:12:31Z</dc:date>
    </item>
    <item>
      <title>Re: Filter IIS Logs with 80 and 443</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-filter-IIS-Logs-with-80-and-443/m-p/627719#M218108</link>
      <description>&lt;P&gt;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/161352"&gt;@gcusello&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;at first check the regexes in Splunk Search using the regex command. --&amp;gt; Yes I have checked in the Search Head and it seems to be fine.&lt;/P&gt;&lt;P&gt;index="*" sourcetype=**&lt;BR /&gt;| regex GET\s*\/\s*-\s*80&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Then One question: before the Heavy Forwarder where are located the conf files, are there other Heavy Forwarders? --&amp;gt; The client machines forwarder output has been send to Heavy Forwarder 1 and from there it will reach the indexers so similarly I have placed the config files&amp;nbsp; props and transforms in an app&amp;nbsp; to the same Heavy Forwarder 1 server and also have restarted the services of the client machine as well but still the logs which contains 80 and 443 is not getting removed before ingestion.&lt;/P&gt;&lt;P&gt;I suppose that in the props.conf stanza header, you inserted the correct sourcetype value of the data source to filter.--&amp;gt; Yes exactly.&lt;/P&gt;&lt;P&gt;Currently I am using this props and transforms so is this a correct one to filter out the logs?&lt;/P&gt;&lt;P&gt;props.conf&lt;BR /&gt;[sourcetype]&lt;BR /&gt;TRANSFORMS-null= setnull152,setnull153&lt;/P&gt;&lt;P&gt;transforms.conf&lt;BR /&gt;[setnull152]&lt;BR /&gt;REGEX = GET\s*\/\s*-\s*80&lt;BR /&gt;DEST_KEY = queue&lt;BR /&gt;FORMAT = nullQueue&lt;/P&gt;&lt;P&gt;[setnull153]&lt;BR /&gt;REGEX = GET\s*\/\s*-\s*443&lt;BR /&gt;DEST_KEY = queue&lt;BR /&gt;FORMAT = nullQueue&lt;/P&gt;</description>
      <pubDate>Fri, 20 Jan 2023 10:29:14 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-filter-IIS-Logs-with-80-and-443/m-p/627719#M218108</guid>
      <dc:creator>anandhalagaras1</dc:creator>
      <dc:date>2023-01-20T10:29:14Z</dc:date>
    </item>
    <item>
      <title>Re: Filter IIS Logs with 80 and 443</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-filter-IIS-Logs-with-80-and-443/m-p/627729#M218110</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/207926"&gt;@anandhalagaras1&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;maybe i misunderstood your requirement: do you want to take or discard events with 80 and 443?&lt;/P&gt;&lt;P&gt;if you want to take them and discard the others you can use my first solution:&lt;/P&gt;&lt;P&gt;in props.conf&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;[your_sourcetype]
TRANSFORMS-set= setnull,setparsing&lt;/LI-CODE&gt;&lt;P&gt;in transormsconf&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;[setnull]
REGEX = .
DEST_KEY = queue
FORMAT = nullQueue

[setparsing]
REGEX =  GET\s*\/\s*-\s*80|443
DEST_KEY = queue
FORMAT = indexQueue&lt;/LI-CODE&gt;&lt;P&gt;If you want to discard events with 80 and 443 you can use your solution.&lt;/P&gt;&lt;P&gt;Anyway, I don't like to use two stanzas, please try using only one, also because the sequence of commands (in props is relevant, so to avoid problems I prefer to have a single stanza.&lt;/P&gt;&lt;P&gt;Ciao.&lt;/P&gt;&lt;P&gt;Giuseppe&lt;/P&gt;</description>
      <pubDate>Fri, 20 Jan 2023 12:11:11 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-filter-IIS-Logs-with-80-and-443/m-p/627729#M218110</guid>
      <dc:creator>gcusello</dc:creator>
      <dc:date>2023-01-20T12:11:11Z</dc:date>
    </item>
    <item>
      <title>Re: Filter IIS Logs with 80 and 443</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-filter-IIS-Logs-with-80-and-443/m-p/628815#M218434</link>
      <description>&lt;P&gt;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/161352"&gt;@gcusello&lt;/a&gt;&amp;nbsp;,&lt;/P&gt;&lt;P&gt;Thank you.&lt;/P&gt;&lt;P&gt;This solution worked for sometime. But now the issue is the logs are coming with "get" (In lower case) and the filtration applied for "GET" (Upper case) so the condition is that if the logs are coming with 80 or 443 with "get" OR "GET" the logs should not be ingested into Splunk. So kindly provide the required regex.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Sample Logs:&lt;/P&gt;&lt;P&gt;&lt;SPAN class=""&gt;2023-01-29&lt;/SPAN&gt; &lt;SPAN class=""&gt;02:38:37&lt;/SPAN&gt; &lt;SPAN class=""&gt;xx.yyy.zzz.aaa&lt;/SPAN&gt; &lt;SPAN class=""&gt;&lt;SPAN class=""&gt;get&lt;/SPAN&gt; &lt;SPAN class=""&gt;/&lt;/SPAN&gt; &lt;SPAN class=""&gt;-&lt;/SPAN&gt; &lt;SPAN class=""&gt;80&lt;/SPAN&gt; &lt;SPAN class=""&gt;-&lt;/SPAN&gt;&lt;/SPAN&gt; &lt;SPAN class=""&gt;qq.&lt;A href="http://www.e.rrr" target="_blank" rel="noopener"&gt;www.e.rrr&lt;/A&gt;&lt;/SPAN&gt; &lt;SPAN class=""&gt;-&lt;/SPAN&gt; &lt;SPAN class=""&gt;-&lt;/SPAN&gt; &lt;SPAN class=""&gt;abc&lt;/SPAN&gt; &lt;SPAN class=""&gt;d&lt;/SPAN&gt; &lt;SPAN class=""&gt;e&lt;/SPAN&gt;&lt;SPAN&gt; f&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN class=""&gt;2023-01-29&lt;/SPAN&gt; &lt;SPAN class=""&gt;02:38:37&lt;/SPAN&gt; &lt;SPAN class=""&gt;xx.yyy.zzz.aaa&lt;/SPAN&gt;&amp;nbsp;GET&lt;SPAN class=""&gt;&lt;SPAN class=""&gt;/&lt;/SPAN&gt; &lt;SPAN class=""&gt;-&lt;/SPAN&gt; &lt;SPAN class=""&gt;80&lt;/SPAN&gt; &lt;SPAN class=""&gt;-&lt;/SPAN&gt;&lt;/SPAN&gt; &lt;SPAN class=""&gt;qq.&lt;A href="http://www.e.rrr" target="_blank" rel="noopener"&gt;www.e.rrr&lt;/A&gt;&lt;/SPAN&gt; &lt;SPAN class=""&gt;-&lt;/SPAN&gt; &lt;SPAN class=""&gt;-&lt;/SPAN&gt; &lt;SPAN class=""&gt;abc&lt;/SPAN&gt; &lt;SPAN class=""&gt;d&lt;/SPAN&gt; &lt;SPAN class=""&gt;e&lt;/SPAN&gt;&lt;SPAN&gt; f&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;Currently used props and transforms for reference.&lt;/P&gt;&lt;P&gt;props:&lt;/P&gt;&lt;P&gt;[sourcetype]&lt;BR /&gt;TRANSFORMS-null= setnull1002&lt;BR /&gt;TZ = Etc/GMT&lt;/P&gt;&lt;P&gt;transforms:&lt;/P&gt;&lt;P&gt;[setnull1002]&lt;BR /&gt;REGEX = GET\s*\/\s*-\s*80|443&lt;BR /&gt;DEST_KEY = queue&lt;BR /&gt;FORMAT = nullQueue&lt;/P&gt;</description>
      <pubDate>Mon, 30 Jan 2023 11:59:39 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-filter-IIS-Logs-with-80-and-443/m-p/628815#M218434</guid>
      <dc:creator>anandhalagaras1</dc:creator>
      <dc:date>2023-01-30T11:59:39Z</dc:date>
    </item>
    <item>
      <title>Re: Filter IIS Logs with 80 and 443</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-filter-IIS-Logs-with-80-and-443/m-p/628827#M218437</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/207926"&gt;@anandhalagaras1&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;you have to adapt the regex to this new requirement:&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;REGEX =  (GET|get)\s*\/\s*-\s*80|443&lt;/LI-CODE&gt;&lt;P&gt;if one answer solves your need, please accept one answer for the other people of Community or tell me how I can help you.&lt;/P&gt;&lt;P&gt;Ciao and happy splunking&lt;/P&gt;&lt;P&gt;Giuseppe&lt;/P&gt;&lt;P&gt;P.S.: Karma Points are appreciated &lt;span class="lia-unicode-emoji" title=":winking_face:"&gt;😉&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 30 Jan 2023 13:06:06 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-filter-IIS-Logs-with-80-and-443/m-p/628827#M218437</guid>
      <dc:creator>gcusello</dc:creator>
      <dc:date>2023-01-30T13:06:06Z</dc:date>
    </item>
    <item>
      <title>Re: Filter IIS Logs with 80 and 443</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-filter-IIS-Logs-with-80-and-443/m-p/628840#M218440</link>
      <description>&lt;P&gt;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/161352"&gt;@gcusello&lt;/a&gt;&amp;nbsp;, When i use this query to check in Splunk search head i am getting an error as "&lt;/P&gt;&lt;DIV class=""&gt;&lt;DIV class=""&gt;Unknown search command 'get'.&lt;/DIV&gt;&lt;/DIV&gt;&lt;DIV class=""&gt;&lt;DIV class=""&gt;&lt;DIV class=""&gt;&lt;DIV class=""&gt;&amp;nbsp;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;P&gt;index="xxx" | regex (GET|get)\s*\/\s*-\s*80|443&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;So kindly help to check and update.&lt;/P&gt;</description>
      <pubDate>Mon, 30 Jan 2023 13:51:11 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-filter-IIS-Logs-with-80-and-443/m-p/628840#M218440</guid>
      <dc:creator>anandhalagaras1</dc:creator>
      <dc:date>2023-01-30T13:51:11Z</dc:date>
    </item>
    <item>
      <title>Re: Filter IIS Logs with 80 and 443</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-filter-IIS-Logs-with-80-and-443/m-p/628844#M218444</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/207926"&gt;@anandhalagaras1&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;this regex is for the transforms.conf file,&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;[setnull]
REGEX = .
DEST_KEY = queue
FORMAT = nullQueue

[setparsing]
REGEX =  (GET|get)\s*\/\s*-\s*80|443
DEST_KEY = queue
FORMAT = indexQueue&lt;/LI-CODE&gt;&lt;P&gt;if you use it in a search you have to use quotes:&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;index="xxx" 
| regex "(GET|get)\s*\/\s*-\s*80|443"&lt;/LI-CODE&gt;&lt;P&gt;&amp;nbsp;Ciao.&lt;/P&gt;&lt;P&gt;Giuseppe&lt;/P&gt;</description>
      <pubDate>Mon, 30 Jan 2023 14:34:22 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-filter-IIS-Logs-with-80-and-443/m-p/628844#M218444</guid>
      <dc:creator>gcusello</dc:creator>
      <dc:date>2023-01-30T14:34:22Z</dc:date>
    </item>
  </channel>
</rss>

