AppD Archive

REGEX engine used by Controller

CommunityUser
Splunk Employee
Splunk Employee

Hey guys apologies if this question has been asked and asnwered. I've been beating my head against my desk trying to figure out why my regex patterns for custom match rules have not been working. w/o going in to a long explanation of what i'm doing, I wanted to first ask if anyone know which regex engine the AppD controller uses. Is it PCRE, POSIX, Java, Ruby Python. By process of elimination I can guess that PCRE is not supported.

i'm trying to create transaction groups which seperate out URI with which contain dispatch, grails and ajax. I now my regex work because I've tested them in a PCRE compliant interpreter.

Thanks for any clues.

Curtis

0 Karma
1 Solution

Arun_Dasetty
Super Champion

Hi Curtis,

We see  the reason could be that you are using unsupported syntax on the engine supported by the corresponding agent type, let us know if that is the case. refer doc for more info: http://docs.appdynamics.com/display/PRO14S/Regular+Expressions+In+Match+Conditions#RegularExpression...

Regards,

Arun

View solution in original post

0 Karma

Arun_Dasetty
Super Champion

Hi Curtis,

We see  the reason could be that you are using unsupported syntax on the engine supported by the corresponding agent type, let us know if that is the case. refer doc for more info: http://docs.appdynamics.com/display/PRO14S/Regular+Expressions+In+Match+Conditions#RegularExpression...

Regards,

Arun

0 Karma

CommunityUser
Splunk Employee
Splunk Employee

Hey there Arun, thanks for the tip. I'll switch to java regex and see what happens.

Best,

Curtis

0 Karma

CommunityUser
Splunk Employee
Splunk Employee

Thanks again Arun. Java Regex patterns are working on my custom match rules.

Cheers.

0 Karma
Get Updates on the Splunk Community!

See just what you’ve been missing | Observability tracks at Splunk University

Looking to sharpen your observability skills so you can better understand how to collect and analyze data from ...

Weezer at .conf25? Say it ain’t so!

Hello Splunkers, The countdown to .conf25 is on-and we've just turned up the volume! We're thrilled to ...

How SC4S Makes Suricata Logs Ingestion Simple

Network security monitoring has become increasingly critical for organizations of all sizes. Splunk has ...