Getting Data In

Help with regex on whitelist

a212830
Champion

Hi,

I need to whitelist on the following:

SIPServer-RTP-Routing1-PR-001.20171212_124642_595.log

Anything that has SIPServer, then anything, and then "-PR-001", following the timestamp and then .log.

My attempt... whitelist = SIPServer-???-Routing?-PR-001.*.log

0 Karma

Maverick904
Explorer

Can you please try below query and confirm if it fulfill your requirement.

1.   (?<FileName>SIPServer-.*?-Routing[a-zA-Z0-9]-PR-001.\d+_\d+_\d+.log)

mayurr98
Super Champion

hey @a212830,

Try this in inputs.conf, It will work 100%

[monitor://<mention path>]
whitelist = SIPServer-.*-PR-001\.\d+_\d+_\d+\.log

Let me know if it helps!

0 Karma

hardikJsheth
Motivator

If you want to consider both Routing and PR-001, you can use following regex:

SIPServer-\w*-Routing\d*-PR-001.[0-9_]+.log
0 Karma

wenthold
Communicator

This should work, but you may want to adjust it based upon the format of the timestamps you might see...

SIPServer.*?-PR-001\.[0-9]{8}_[0-9]{6}_[0-9]{3}\.log$

Less strict:

SIPServer.*?-PR-001\.[0-9_]+.log$
0 Karma
Career Survey
First 500 qualified respondents will receive a $20 gift card! Tell us about your professional Splunk journey.
Get Updates on the Splunk Community!

Observe and Secure All Apps with Splunk

 Join Us for Our Next Tech Talk: Observe and Secure All Apps with SplunkAs organizations continue to innovate ...

What's New in Splunk Observability - August 2025

What's New We are excited to announce the latest enhancements to Splunk Observability Cloud as well as what is ...

Introduction to Splunk AI

How are you using AI in Splunk? Whether you see AI as a threat or opportunity, AI is here to stay. Lucky for ...