Getting Data In

Regexp for transform.conf doesnt work

New Member

Splunk receive a log like this:

Nov 15 13:02:10 test WARNING 1 "Invalid path" 0 2040 5 "bla bla bla" sampled 1 0 N/A low drop FFFFFFFF-FFFF-FFFF-000E-000059C98546

And vendor said that each field is separated by a single space character. Fields that may contain spaces are printed between double quotes. So for each field i use configuration like this:




REGEX = (".*?"|\S+)
FORMAT = device_ip::$4
MV_ADD = true

REGEX = (".*?"|\S+)
FORMAT = attack_name::$8
MV_ADD = true

I've already test regexp with and it should just split fields in accordance to vendors documentation, but it doesn't work.

all files I put in /opt/splunk/etc/system/local/

0 Karma

Ultra Champion

Your regex contains just 1 capturing group, so how can you refer to $4 and $8?

Yes, this regex matches all the bits separated by spaces, but this is not how you extract fields from an event like this.

Approaches that would work:

REGEX = (".*?"|\S+)\s(".*?"|\S+)\s(".*?"|\S+)\s etc.
FORMAT = field1::$1 field2::$2 field3::$3 etc.

Which uses a regex that matches the event as a whole and extracts each field into a capture group and then assigns those capture groups to the relevant fieldname.


REGEX = (?:(?:".*?"|\S+)\s){10}(".*?"|\S+)
FORMAT = ip::$1

Which skips over X (10 in this example) fields and then extracts a single piece to assign to a specific field.

0 Karma

Path Finder

Have you tried setting the MV_Add to its default value? Which is false.

0 Karma


The second IP address ("defenceattackname") is group #9, not 8.
When you say "it doesn't work", what exactly do you mean? What results are you getting?

If this reply helps you, an upvote would be appreciated.
0 Karma

New Member

Actually I'm getting nothing 🙂
I mean that nothing extracted at all except field vendorproduct which defined as EVAL-vendorproduct = "Radware" in props.conf
You can see it on screenshot
How could I debug fields extraction?

0 Karma