<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Finding logs with special characters in Splunk Cloud Platform</title>
    <link>https://community.splunk.com/t5/Splunk-Cloud-Platform/Finding-logs-with-special-characters/m-p/671151#M2675</link>
    <description>&lt;P&gt;Thank you for suggesting, it worked&lt;/P&gt;</description>
    <pubDate>Thu, 07 Dec 2023 13:35:47 GMT</pubDate>
    <dc:creator>binay2634</dc:creator>
    <dc:date>2023-12-07T13:35:47Z</dc:date>
    <item>
      <title>Finding logs with special characters</title>
      <link>https://community.splunk.com/t5/Splunk-Cloud-Platform/Finding-logs-with-special-characters/m-p/671003#M2671</link>
      <description>&lt;P&gt;Hi All,&lt;/P&gt;&lt;P&gt;I have been trying to extract userids which has special characters in it but with no luck.&lt;/P&gt;&lt;P&gt;For ex let's say a field name uid contains two userids one is "roboticts@gmail.com" and the other one is "difficult+1@gmail.com".&lt;/P&gt;&lt;P&gt;Now I want to write a query which could extract only the uid with + sign in it.&amp;nbsp; Please help on this&lt;/P&gt;</description>
      <pubDate>Wed, 06 Dec 2023 11:34:19 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Cloud-Platform/Finding-logs-with-special-characters/m-p/671003#M2671</guid>
      <dc:creator>binay2634</dc:creator>
      <dc:date>2023-12-06T11:34:19Z</dc:date>
    </item>
    <item>
      <title>Re: Finding logs with special characters</title>
      <link>https://community.splunk.com/t5/Splunk-Cloud-Platform/Finding-logs-with-special-characters/m-p/671019#M2672</link>
      <description>&lt;P&gt;Assuming only 1 + and user id is in quotes.&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;| rex "(?&amp;lt;userid&amp;gt;[^\"]+\+[^\"]+@[^\"]+)"&lt;/LI-CODE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 06 Dec 2023 14:34:37 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Cloud-Platform/Finding-logs-with-special-characters/m-p/671019#M2672</guid>
      <dc:creator>ITWhisperer</dc:creator>
      <dc:date>2023-12-06T14:34:37Z</dc:date>
    </item>
    <item>
      <title>Re: Finding logs with special characters</title>
      <link>https://community.splunk.com/t5/Splunk-Cloud-Platform/Finding-logs-with-special-characters/m-p/671151#M2675</link>
      <description>&lt;P&gt;Thank you for suggesting, it worked&lt;/P&gt;</description>
      <pubDate>Thu, 07 Dec 2023 13:35:47 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Cloud-Platform/Finding-logs-with-special-characters/m-p/671151#M2675</guid>
      <dc:creator>binay2634</dc:creator>
      <dc:date>2023-12-07T13:35:47Z</dc:date>
    </item>
  </channel>
</rss>

