HI @danielbb ,
as also @livehybrid said, it's mandatory to have a sample of your logs to check your regex, even if it's very simple.
One additional question: what's the flow of your data?
To correctly work this transformation must be located in the first full Splunk instance where logs pass through, in other words in the first Heavy Forwarder.
Ciao.
Giuseppe
Hi @danielbb
Are you able to post a sample of the event you are working with and also how you are calling the REGEX/transform?
Does this make any difference?
REGEX = \}\sOnChange🌟 Did this answer help you? If so, please consider:
Your feedback encourages the volunteers in this community to continue contributing
Hi @livehybrid ,
Thank you for the great response.
It seemed to have been a simple typo on my side.
Do you know how I could rework this REGEX to work for multiple phrases (about 50 or so)?
Is it best practice to do it all in one REGEX statement or split it into multiple transforms.conf stanzas?
Well, performance-wise one transform with a well-crafted regex should be faster than several dozens of separate ones. The question is whether you'll need to maintain that later because a single humongous regex can be very confusing and prone to errors on edit.