Hi All,
I am a newbie on splunk and I have the following events:
IF-MIB::ifInOctets.502 = Counter32: 675328773
IF-MIB::ifInOctets.501 = Counter32: 407638105
And would like to extract the info like this.
key=ifInOctets.502, value=675328773
key=ifInOctets.501, value=407638105
what should I configure in transforms.conf? Thanks for your help.
Assuming that the leading "IF-MIB::" and the string "Counter32:" are constant for all events you want to extract this from, put something like this in transforms.conf:
[extract_snmp]
REGEX = IF-MIB::(\S+) = Counter32: (\d+)
FORMAT = $1::$2
Then refer to it like this in props.conf:
[yoursourcetype]
REPORT-snmpextract = extract_snmp
Thanks alot.
Assuming that the leading "IF-MIB::" and the string "Counter32:" are constant for all events you want to extract this from, put something like this in transforms.conf:
[extract_snmp]
REGEX = IF-MIB::(\S+) = Counter32: (\d+)
FORMAT = $1::$2
Then refer to it like this in props.conf:
[yoursourcetype]
REPORT-snmpextract = extract_snmp
No problem. Could you please mark my answer as accepted if this solved your issue? Thanks!
Something like this should work (and be more generic):
IF-MIB::(\S+) = [^:]+: (\S+)
Thanks alot.
One stupid question: how can I modify the REGEX to match this also.
IF-MIB::ifDescr.501 = STRING: ge-0/0/0
Thanks alot.