Getting Data In

Help with regex on whitelist

a212830
Champion

Hi,

I need to whitelist on the following:

SIPServer-RTP-Routing1-PR-001.20171212_124642_595.log

Anything that has SIPServer, then anything, and then "-PR-001", following the timestamp and then .log.

My attempt... whitelist = SIPServer-???-Routing?-PR-001.*.log

0 Karma

Maverick904
Explorer

Can you please try below query and confirm if it fulfill your requirement.

1.   (?<FileName>SIPServer-.*?-Routing[a-zA-Z0-9]-PR-001.\d+_\d+_\d+.log)

mayurr98
Super Champion

hey @a212830,

Try this in inputs.conf, It will work 100%

[monitor://<mention path>]
whitelist = SIPServer-.*-PR-001\.\d+_\d+_\d+\.log

Let me know if it helps!

0 Karma

hardikJsheth
Motivator

If you want to consider both Routing and PR-001, you can use following regex:

SIPServer-\w*-Routing\d*-PR-001.[0-9_]+.log
0 Karma

wenthold
Communicator

This should work, but you may want to adjust it based upon the format of the timestamps you might see...

SIPServer.*?-PR-001\.[0-9]{8}_[0-9]{6}_[0-9]{3}\.log$

Less strict:

SIPServer.*?-PR-001\.[0-9_]+.log$
0 Karma
Get Updates on the Splunk Community!

Application management with Targeted Application Install for Victoria Experience

  Experience a new era of flexibility in managing your Splunk Cloud Platform apps! With Targeted Application ...

Index This | What goes up and never comes down?

January 2026 Edition  Hayyy Splunk Education Enthusiasts and the Eternally Curious!   We’re back with this ...

Splunkers, Pack Your Bags: Why Cisco Live EMEA is Your Next Big Destination

The Power of Two: Splunk &#43; Cisco at "Ludicrous Scale"   You know Splunk. You know Cisco. But have you seen ...