Appreciate your response @richgalloway
I thought it deals with the raw data.
I see that it only works on Category, CategoryString, ComputerName, EventCode, EventType, Keywords,
LogName, Message, OpCode, RecordNumber, Sid, SidType, SourceName,
TaskCategory, Type, User.
The keyword that I wanted to AND with was "splunk-" and I used the Message field.
I could make it work, thanks so much.
Could you please tell me what format should I use if I want to drop them in transforms.conf?
I tried a few regexes that again worked in regex editors but splunk ignored it.
... View more