Getting Data In

Help with regex on whitelist

a212830
Champion

Hi,

I need to whitelist on the following:

SIPServer-RTP-Routing1-PR-001.20171212_124642_595.log

Anything that has SIPServer, then anything, and then "-PR-001", following the timestamp and then .log.

My attempt... whitelist = SIPServer-???-Routing?-PR-001.*.log

0 Karma

Maverick904
Explorer

Can you please try below query and confirm if it fulfill your requirement.

1.   (?<FileName>SIPServer-.*?-Routing[a-zA-Z0-9]-PR-001.\d+_\d+_\d+.log)

mayurr98
Super Champion

hey @a212830,

Try this in inputs.conf, It will work 100%

[monitor://<mention path>]
whitelist = SIPServer-.*-PR-001\.\d+_\d+_\d+\.log

Let me know if it helps!

0 Karma

hardikJsheth
Motivator

If you want to consider both Routing and PR-001, you can use following regex:

SIPServer-\w*-Routing\d*-PR-001.[0-9_]+.log
0 Karma

wenthold
Communicator

This should work, but you may want to adjust it based upon the format of the timestamps you might see...

SIPServer.*?-PR-001\.[0-9]{8}_[0-9]{6}_[0-9]{3}\.log$

Less strict:

SIPServer.*?-PR-001\.[0-9_]+.log$
0 Karma
Career Survey
First 500 qualified respondents will receive a $20 gift card! Tell us about your professional Splunk journey.

Can’t make it to .conf25? Join us online!

Get Updates on the Splunk Community!

Community Content Calendar, September edition

Welcome to another insightful post from our Community Content Calendar! We're thrilled to continue bringing ...

Splunkbase Unveils New App Listing Management Public Preview

Splunkbase Unveils New App Listing Management Public PreviewWe're thrilled to announce the public preview of ...

Leveraging Automated Threat Analysis Across the Splunk Ecosystem

Are you leveraging automation to its fullest potential in your threat detection strategy?Our upcoming Security ...