Splunk Search

Getting the wrong fields extracted from my props and transforms conf files

Sparky1
Explorer

So i'm trying to extract and ip address from a multi-value field
and my transforms stanza is something along these lines

transforms.conf
[ip]
REGEX = ((?:(?:\d{1,3}.){3}(?:\d{1,3}))|(?:(?:::)?(?:[\dA-Fa-f]{1,4}:{1,2}){1,7}(?:[\d\%A-Fa-z.]+)?(?:::)?)|(?:::[\dA-Fa-f.]{1,15})|(?:::)]*)
FORMAT = IP::$1

props.conf

[host::hostname]
TIME_FORMAT = %a %b %d %H:%M:%S %T %Y
KV_MODE = none
SHOULD_LINEMERGE = false
REPORT-ip = ip

So this works, however it also extracts the source, sourcetype and host values in my new ip field.
So i have random fields that look like IP= source::source|host::host|sourcetype.

I could really use some help in trying to figure out why these extra values are being extracted.

0 Karma

jkat54
SplunkTrust
SplunkTrust

Are you on a single server instance?

What if you try using only props? Something like below in props.conf in place of REPORT...

 EXTRACT-ip = (?<ip>(?:(?:\d{1,3}.){3}(?:\d{1,3}))|(?:(?:::)?(?:[\dA-Fa-f]{1,4}:{1,2}){1,7}(?:[\d\%A-Fa-z.]+)?(?:::)?)|(?:::[\dA-Fa-f.]{1,15})|(?:::)]*)
0 Karma

Sparky1
Explorer

Thank you, i tried this and I'm still getting the same results. Although I've noticed that my issue only occurs when I run a search with data from 2 sources.
One of the sources is the one i want my extractions to match against
and the other source shouldn't be getting matched

My props stanza should only be matching hosts like this:
[host::(?-i)hostname1*]

but it's also matching and performing extractions(incorrectly) against the hosts that don't match my stanza

0 Karma

jkat54
SplunkTrust
SplunkTrust

Do you have any other props defined that are overriding / adding to the mix?

 ./splunk btool props list --debug
0 Karma

Sparky1
Explorer

It's very possible. I just ran the debug command you suggested, and I've got a couple thousand lines to sift through

0 Karma

justinatpnnl
Communicator

Can you provide a sample event?

0 Karma
Career Survey
First 500 qualified respondents will receive a $20 gift card! Tell us about your professional Splunk journey.

Can’t make it to .conf25? Join us online!

Get Updates on the Splunk Community!

Take Action Automatically on Splunk Alerts with Red Hat Ansible Automation Platform

 Are you ready to revolutionize your IT operations? As digital transformation accelerates, the demand for ...

Calling All Security Pros: Ready to Race Through Boston?

Hey Splunkers, .conf25 is heading to Boston and we’re kicking things off with something bold, competitive, and ...

Beyond Detection: How Splunk and Cisco Integrated Security Platforms Transform ...

Financial services organizations face an impossible equation: maintain 99.9% uptime for mission-critical ...