Splunk Search

How to build a tranform which applies to a events with a field value found in a provided list

juniormint
Communicator

I have a index time transform which is a bit loose in what it matches. I would like to limit it to a whitelist of indexes that I want to match against. I would very much appreciate your help with creating a clean regular expression to achieve the goal.

So I think I want REGEX = match any event with a embedded field of the form index="SomeIndexName" where SomeIndexName in (App1,App2,App3).

My current transform
[MyTransform]
REGEX=.index="(.?)"
DEST_KEY=_MetaData:Index
FORMAT=$1
CLEAN_KEYS
MV_ADD=0

0 Karma
1 Solution

lukejadamec
Super Champion

The OR operator for regex is the pipe:

REGEX= index="(App1|App2|App3)"

I changed .index to just index because I'm not sure you need it.

View solution in original post

lukejadamec
Super Champion

The OR operator for regex is the pipe:

REGEX= index="(App1|App2|App3)"

I changed .index to just index because I'm not sure you need it.

juniormint
Communicator

Yes. $1 will contain the value inside the parenthesis.

juniormint
Communicator

Will $1 still contain the field value?

0 Karma
Get Updates on the Splunk Community!

Automatic Discovery Part 1: What is Automatic Discovery in Splunk Observability Cloud ...

If you’ve ever deployed a new database cluster, spun up a caching layer, or added a load balancer, you know it ...

Real-Time Fraud Detection: How Splunk Dashboards Protect Financial Institutions

Financial fraud isn't slowing down. If anything, it's getting more sophisticated. Account takeovers, credit ...

Splunk + ThousandEyes: Correlate frontend, app, and network data to troubleshoot ...

 Are you tired of troubleshooting delays caused by siloed frontend, application, and network data? We've got a ...