Getting Data In

Eval and rex to props.comf

Splunk_rocks
Path Finder

Just looking some help to construct props file for below search statement.

| rex max_match=10 field=violation_details "(?[^<]+)" | base64 field=cookie_value action=decode |

0 Karma

mhoogcarspel_sp
Splunk Employee
Splunk Employee

The rex part you can do with a REPORT and a MV_ADD = true in the transforms I think, however the base64 command is another question, as you can't call commands in props/transforms.

I think you would either have to still have the base64 in your search, or thinking outside of the box a bit:
You could implement a base64 lookup as an external script lookup, although I don't know what the limits are of the size that you can input (i.e. this probably won't work for big base64 blobs)

0 Karma

Splunk_rocks
Path Finder

Thanks for the update, thats what i feel but just thought of double check

0 Karma

cpetterborg
SplunkTrust
SplunkTrust

Are you trying to get the base64 encoded field decoded through the props.confconfiguration? If so, this can't be done, there is no method of doing the decoding within the props.conf file. You can extract the field, but it will be in the encoded state, not decoded.

0 Karma

Splunk_rocks
Path Finder

| rex max_match=10 field=violation_details "(?[^<]+)" | base64 field=cookie_value action=decode |

0 Karma

Splunk_rocks
Path Finder

missing filed info so pasted here ..Looks like field=violation_details ""(?)

0 Karma

FrankVl
Ultra Champion

put your search code in as code (use the 101010 button, or surround with ```).

0 Karma
Get Updates on the Splunk Community!

Stay Connected: Your Guide to May Tech Talks, Office Hours, and Webinars!

Take a look below to explore our upcoming Community Office Hours, Tech Talks, and Webinars this month. This ...

They're back! Join the SplunkTrust and MVP at .conf24

With our highly anticipated annual conference, .conf, comes the fez-wearers you can trust! The SplunkTrust, as ...

Enterprise Security Content Update (ESCU) | New Releases

Last month, the Splunk Threat Research Team had two releases of new security content via the Enterprise ...