Splunk Search

REGEX transforms.conf help

ryastrebov
Communicator

Hello!
I have this log:

 013db64db1d4,250993102139,62f0cffe,3fad,fbc3,7f08ff01
 013db64db1cd,250027013354,_,3fde,fd9e,_
 013db64db1ae,@,95800970,3fad,fbb1,82e01bbc
 013db64db1cd,250993231395,78e0f35c,df5a,8b71,63a0d3d4
 013db64db106,@,9910a7a2,3fde,890d,8320b744

I want to ignore events with @ on second position in every event on this log. What REGEX should I write in a file transforms.conf for nullQueue filtering?
Instead of the symbol @ to be read symbol _
The _ in the code for some reason does not appear.

Sorry, I new in regular expression, unfortunately.

Thanks!

Tags (1)
0 Karma
1 Solution

kristian_kolb
Ultra Champion

"Instead of the symbol @ to be read symbol _"

Does this mean that you would like to send all events matching "_" (underscore) in the second position to the nullQueue?

In that case your transform/regex should be;

REGEX = ^\w+,_,
DEST_KEY = queue
FORMAT = nullQueue

Of course you could be even more specific, if you only want this nullqueueing to happen when the first position is a 12-characer hex string;

REGEX = ^[a-fA-F0-9]{12},_,

or less specific, if the first position can contain anything (apart from a comma);

REGEX = ^[^,]+,_,

Hope this helps,

Kristian

View solution in original post

kristian_kolb
Ultra Champion

"Instead of the symbol @ to be read symbol _"

Does this mean that you would like to send all events matching "_" (underscore) in the second position to the nullQueue?

In that case your transform/regex should be;

REGEX = ^\w+,_,
DEST_KEY = queue
FORMAT = nullQueue

Of course you could be even more specific, if you only want this nullqueueing to happen when the first position is a 12-characer hex string;

REGEX = ^[a-fA-F0-9]{12},_,

or less specific, if the first position can contain anything (apart from a comma);

REGEX = ^[^,]+,_,

Hope this helps,

Kristian

kristian_kolb
Ultra Champion

Oh, and it seems like your events have hex timestamps, does Splunk treat that gracefully?

0 Karma

ryastrebov
Communicator

Thank you, Kristian!
This is just what I needed!

0 Karma
Career Survey
First 500 qualified respondents will receive a $20 gift card! Tell us about your professional Splunk journey.

Can’t make it to .conf25? Join us online!

Get Updates on the Splunk Community!

Community Content Calendar, September edition

Welcome to another insightful post from our Community Content Calendar! We're thrilled to continue bringing ...

Splunkbase Unveils New App Listing Management Public Preview

Splunkbase Unveils New App Listing Management Public PreviewWe're thrilled to announce the public preview of ...

Leveraging Automated Threat Analysis Across the Splunk Ecosystem

Are you leveraging automation to its fullest potential in your threat detection strategy?Our upcoming Security ...