![]() I'm seeing a repeated pattern of events in splunkd.log, relating to several. :-(įrom what I guess the regexp is trying to strip off the beginning of the log-line up to the first word which is followed by a colon whereas this word is then considered the "DNS_Type". I am definatly not a regexp-pro and thus unable to fix this issue on my own. Anyone else tried to use this app to any successful extent? ![]() I guess it's trying to match the type of log-message (client query, xfer, etc.) to something meaningful.įor me this regexp does not match appropriately and thus renders this App almost useless. ![]() Most of the saved searches work based on a regexp which searches for a "DNS_Type"-field. ![]() I am trying to use the Splunk for DNS App. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |