<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Fields Extraction from raw events with regex in Splunk Enterprise</title>
    <link>https://community.splunk.com/t5/Splunk-Enterprise/How-to-Extract-Fields-from-raw-events-with-regex/m-p/593126#M12176</link>
    <description>&lt;P&gt;Hi for the search to work you would have to write this :&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;&amp;lt;your base search&amp;gt;
| extract kvdelim=":" pairdelim="," 
| rex "Server\s*:\s*(?&amp;lt;Server&amp;gt;[^\,]+)"&lt;/LI-CODE&gt;&lt;P&gt;props.conf and transforms.conf is best to put on the heavy forwarder if you have one or the indexing layer.&lt;/P&gt;&lt;P&gt;The regex that I provided is for transforms only and it works well for all the events that you have given.&lt;/P&gt;&lt;P&gt;&lt;A href="https://regex101.com/r/0rdToo/1" target="_blank"&gt;https://regex101.com/r/0rdToo/1&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;use below configuration on HF or Indexers.&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;props.conf
[ssc_cloakware]
REPORT-extractions = field_extractions
 
transforms.conf
[field_extractions]
REGEX = \s([^\:]+)\:\s+([^\,]+)
FORMAT = $1::$2&lt;/LI-CODE&gt;&lt;P&gt;Restart the instance after editing the configuration.&amp;nbsp;&lt;/P&gt;&lt;P&gt;I am gonna test this configuration on my lab instance. meanwhile you do the same.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Fri, 08 Apr 2022 14:58:03 GMT</pubDate>
    <dc:creator>mayurr98</dc:creator>
    <dc:date>2022-04-08T14:58:03Z</dc:date>
    <item>
      <title>How to Extract Fields from raw events with regex</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise/How-to-Extract-Fields-from-raw-events-with-regex/m-p/592800#M12119</link>
      <description>&lt;P&gt;Need to extract fields from the below raw data currently no fields automatically extracted.&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Raw Event:&lt;/STRONG&gt;&lt;BR /&gt;&lt;SPAN&gt;Server: autoparts01, &lt;/SPAN&gt;&lt;SPAN class=""&gt;Userid:&lt;/SPAN&gt;&lt;SPAN&gt; monika, Alias: autoparts01monika, Return Code: 400, Password Len: 32, Host: ELKSPL3212, Execution ID: autodr1, Directory: C:\windows\system32, Program: C:\windows\Sys64\dllhost.exe, Elapsed Time: 0, Bypass Cache: false, Type: Windows dll - 0, Version: 3.6&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Output Sample: need regex and the fields are every separated&amp;nbsp;by (,)&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Server: autoparts01 to Server=autoparts01&lt;BR /&gt;&lt;/SPAN&gt;&lt;SPAN&gt;&lt;SPAN class=""&gt;Userid:&lt;/SPAN&gt; monika to Userid=monika&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 07 Apr 2022 15:29:00 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise/How-to-Extract-Fields-from-raw-events-with-regex/m-p/592800#M12119</guid>
      <dc:creator>pchintha</dc:creator>
      <dc:date>2022-04-07T15:29:00Z</dc:date>
    </item>
    <item>
      <title>Re: Fields Extraction from raw events with regex</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise/How-to-Extract-Fields-from-raw-events-with-regex/m-p/592807#M12121</link>
      <description>&lt;P&gt;For SPL try this:&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;&amp;lt;your base search&amp;gt; 
| extract kvdelim=":" pairdelim=","&lt;/LI-CODE&gt;</description>
      <pubDate>Thu, 07 Apr 2022 04:16:56 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise/How-to-Extract-Fields-from-raw-events-with-regex/m-p/592807#M12121</guid>
      <dc:creator>mayurr98</dc:creator>
      <dc:date>2022-04-07T04:16:56Z</dc:date>
    </item>
    <item>
      <title>Re: Fields Extraction from raw events with regex</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise/How-to-Extract-Fields-from-raw-events-with-regex/m-p/592812#M12123</link>
      <description>&lt;P&gt;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/172209"&gt;@mayurr98&lt;/a&gt;&amp;nbsp;So good thanks for the quick help, this is working for me.&lt;/P&gt;&lt;P&gt;am getting the all fields separated from raw events except from &lt;STRONG&gt;Server&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;and also need&lt;STRONG&gt; STANZA&lt;/STRONG&gt; same thing need to fix this automatic in props.conf and transforms.conf in the app&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="pchintha_0-1649305562115.png" style="width: 400px;"&gt;&lt;img src="https://community.splunk.com/t5/image/serverpage/image-id/18976i8173235310907381/image-size/medium?v=v2&amp;amp;px=400" role="button" title="pchintha_0-1649305562115.png" alt="pchintha_0-1649305562115.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 07 Apr 2022 04:28:56 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise/How-to-Extract-Fields-from-raw-events-with-regex/m-p/592812#M12123</guid>
      <dc:creator>pchintha</dc:creator>
      <dc:date>2022-04-07T04:28:56Z</dc:date>
    </item>
    <item>
      <title>Re: Fields Extraction from raw events with regex</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise/How-to-Extract-Fields-from-raw-events-with-regex/m-p/592816#M12124</link>
      <description>&lt;P&gt;Server should be there as well, you can search for that field in all fields.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;Transforms.conf 

[myplaintransform]
REGEX=\s([^\:]+)\:\s+([^\,]+)
FORMAT=$1::$2

props.conf

[sourcetype_name]
REPORT-a = myplaintransform&lt;/LI-CODE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Accept/Like if it works for you.&lt;/P&gt;</description>
      <pubDate>Thu, 07 Apr 2022 05:06:19 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise/How-to-Extract-Fields-from-raw-events-with-regex/m-p/592816#M12124</guid>
      <dc:creator>mayurr98</dc:creator>
      <dc:date>2022-04-07T05:06:19Z</dc:date>
    </item>
    <item>
      <title>Re: Fields Extraction from raw events with regex</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise/How-to-Extract-Fields-from-raw-events-with-regex/m-p/592819#M12125</link>
      <description>&lt;P&gt;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/172209"&gt;@mayurr98&lt;/a&gt;&amp;nbsp;No i already saw i guess why its not taking up is there is a space before the &lt;STRONG&gt;Server&amp;nbsp;&lt;/STRONG&gt;field you can see the sample raw data below&lt;BR /&gt;&lt;BR /&gt;&lt;STRONG&gt;&lt;SPAN class=""&gt;04-07-2022&lt;/SPAN&gt; &lt;SPAN class=""&gt;00:44&lt;/SPAN&gt; &lt;SPAN class=""&gt;Server:&lt;/SPAN&gt; &lt;SPAN class=""&gt;bug&lt;/SPAN&gt;, &lt;/STRONG&gt;&lt;SPAN class=""&gt;Userid:&lt;/SPAN&gt; &lt;SPAN class=""&gt;monika&lt;/SPAN&gt;&lt;SPAN&gt;, &lt;/SPAN&gt;&lt;SPAN class=""&gt;Alias:&lt;/SPAN&gt;&amp;nbsp;bugmonika&lt;SPAN&gt;, &lt;/SPAN&gt;&lt;SPAN class=""&gt;Return&lt;/SPAN&gt; &lt;SPAN class=""&gt;Code:&lt;/SPAN&gt; &lt;SPAN class=""&gt;400&lt;/SPAN&gt;&lt;SPAN&gt;, &lt;/SPAN&gt;&lt;SPAN class=""&gt;Password&lt;/SPAN&gt; &lt;SPAN class=""&gt;Len:&lt;/SPAN&gt; &lt;SPAN class=""&gt;16&lt;/SPAN&gt;&lt;SPAN&gt;, &lt;/SPAN&gt;&lt;SPAN class=""&gt;Host:&lt;/SPAN&gt; &lt;SPAN class=""&gt;lhplc3216&lt;/SPAN&gt;&lt;SPAN&gt;, &lt;/SPAN&gt;&lt;SPAN class=""&gt;Execution&lt;/SPAN&gt; &lt;SPAN class=""&gt;ID:&lt;/SPAN&gt; &lt;SPAN class=""&gt;oracle&lt;/SPAN&gt;&lt;SPAN&gt;, &lt;/SPAN&gt;&lt;SPAN class=""&gt;Directory:&lt;/SPAN&gt; &lt;SPAN class=""&gt;/bug/lds/oracle/rdbms/dbh_7347285/dbs&lt;/SPAN&gt; &lt;SPAN class=""&gt;Program:&lt;/SPAN&gt; &lt;SPAN class=""&gt;bugeco.exe&lt;/SPAN&gt;&lt;SPAN&gt;, &lt;/SPAN&gt;&lt;SPAN class=""&gt;Elapsed&lt;/SPAN&gt; &lt;SPAN class=""&gt;Time:&lt;/SPAN&gt; &lt;SPAN class=""&gt;0&lt;/SPAN&gt;&lt;SPAN&gt;, &lt;/SPAN&gt;&lt;SPAN class=""&gt;Bypass&lt;/SPAN&gt; &lt;SPAN class=""&gt;Cache:&lt;/SPAN&gt; &lt;SPAN class=""&gt;false&lt;/SPAN&gt;&lt;SPAN&gt;, &lt;/SPAN&gt;&lt;SPAN class=""&gt;Type:&lt;/SPAN&gt; &lt;SPAN class=""&gt;Unix&lt;/SPAN&gt;&lt;SPAN&gt;, &lt;/SPAN&gt;&lt;SPAN class=""&gt;Version:&lt;/SPAN&gt; &lt;SPAN class=""&gt;2.0&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 07 Apr 2022 04:47:58 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise/How-to-Extract-Fields-from-raw-events-with-regex/m-p/592819#M12125</guid>
      <dc:creator>pchintha</dc:creator>
      <dc:date>2022-04-07T04:47:58Z</dc:date>
    </item>
    <item>
      <title>Re: Fields Extraction from raw events with regex</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise/How-to-Extract-Fields-from-raw-events-with-regex/m-p/592821#M12126</link>
      <description>&lt;P&gt;I have updated the transform to accumulate the server field:&lt;/P&gt;&lt;P&gt;The raw event that you gave , it should work now.&lt;/P&gt;&lt;P&gt;&lt;A href="https://regex101.com/r/dL6JPE/1" target="_blank"&gt;https://regex101.com/r/dL6JPE/1&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 07 Apr 2022 05:07:39 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise/How-to-Extract-Fields-from-raw-events-with-regex/m-p/592821#M12126</guid>
      <dc:creator>mayurr98</dc:creator>
      <dc:date>2022-04-07T05:07:39Z</dc:date>
    </item>
    <item>
      <title>Re: Fields Extraction from raw events with regex</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise/How-to-Extract-Fields-from-raw-events-with-regex/m-p/593113#M12171</link>
      <description>&lt;P&gt;Hi as you provided this is not working for me, and the regex 101 link which you provided its on working only on that not in Splunk query.&lt;/P&gt;&lt;P&gt;And the transforms.conf and props.conf is also not working.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 08 Apr 2022 13:24:22 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise/How-to-Extract-Fields-from-raw-events-with-regex/m-p/593113#M12171</guid>
      <dc:creator>pchintha</dc:creator>
      <dc:date>2022-04-08T13:24:22Z</dc:date>
    </item>
    <item>
      <title>Re: Fields Extraction from raw events with regex</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise/How-to-Extract-Fields-from-raw-events-with-regex/m-p/593114#M12172</link>
      <description>&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;could you please give me below details:&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;1) please share more sample raw events&lt;/P&gt;&lt;P&gt;2) share the props and transforms that you have wrote&lt;/P&gt;&lt;P&gt;3) where did you write the props and transforms?&lt;/P&gt;&lt;P&gt;4) have you restarted splunk instance after updating props and transforms ?&lt;/P&gt;</description>
      <pubDate>Fri, 08 Apr 2022 13:38:01 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise/How-to-Extract-Fields-from-raw-events-with-regex/m-p/593114#M12172</guid>
      <dc:creator>mayurr98</dc:creator>
      <dc:date>2022-04-08T13:38:01Z</dc:date>
    </item>
    <item>
      <title>Re: Fields Extraction from raw events with regex</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise/How-to-Extract-Fields-from-raw-events-with-regex/m-p/593116#M12173</link>
      <description>&lt;P&gt;1) please share more sample raw events&lt;/P&gt;&lt;P&gt;04-08-2022 06:31 Server: O85XDC7, Userid: PKDPRW8, Alias: o34xda3pkspaw8, Return Code: 400, Password Len: 8, Host: hello1625.winki.com, Execution ID: ccms, Directory: /usr/local/scripts, Program: CoWXatrix.jar, Elapsed Time: 0, Bypass Cache: false, Type: Unix, Version: 2.0&lt;BR /&gt;&lt;BR /&gt;04-08-2022 06:31 Server: O87XDC0, Userid: TOWDHU1, Alias: o73xda3sppklxl, Return Code: 400, Password Len: 25, Host: hello1625.winki.com, Execution ID: ccms, Directory: /usr/local/scripts, Program: CoWXatrix.jar, Elapsed Time: 0, Bypass Cache: false, Type: Unix, Version: 2.0&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;04-08-2022 06:31 Server: O85XDC7, Userid: PKDPRW8, Alias: o34xda3pkspaw8, Return Code: 400, Password Len: 8, Host: hello1625.winki.com, Execution ID: ccms, Directory: /usr/local/scripts, Program: CoWXatrix.jar, Elapsed Time: 0, Bypass Cache: false, Type: Unix, Version: 2.0&lt;/P&gt;&lt;P&gt;2) share the props and transforms that you have wrote&lt;BR /&gt;We tried in all different ways but no luck&lt;/P&gt;&lt;DIV&gt;&lt;DIV&gt;&lt;SPAN&gt;&lt;STRONG&gt;props.conf&lt;/STRONG&gt;&lt;BR /&gt;[ssc_cloakware]&lt;/SPAN&gt;&lt;/DIV&gt;&lt;DIV&gt;&lt;SPAN&gt;REPORT-&lt;/SPAN&gt;&lt;SPAN&gt;extractions&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN&gt;=&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;extractions&lt;/SPAN&gt;&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;&lt;STRONG&gt;transforms.conf&lt;/STRONG&gt;&lt;/DIV&gt;&lt;DIV&gt;&lt;DIV&gt;&lt;DIV&gt;&lt;SPAN&gt;[extractions]&lt;/SPAN&gt;&lt;/DIV&gt;&lt;DIV&gt;&lt;SPAN&gt;DELIMS&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN&gt;=&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN&gt;","&lt;/SPAN&gt;&lt;SPAN&gt;,&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN&gt;":"&lt;/SPAN&gt;&lt;/DIV&gt;&lt;DIV&gt;&lt;SPAN&gt;#SOURCE_KEY&amp;nbsp;=&amp;nbsp;_raw&lt;/SPAN&gt;&lt;/DIV&gt;&lt;DIV&gt;&lt;SPAN&gt;#REGEX&amp;nbsp;=&amp;nbsp;\s([^\:]+)\:\s+([^\,]+)&lt;/SPAN&gt;&lt;/DIV&gt;&lt;DIV&gt;&lt;SPAN&gt;#FORMAT&amp;nbsp;=&amp;nbsp;$1::$2&lt;/SPAN&gt;&lt;/DIV&gt;&lt;DIV&gt;&lt;SPAN&gt;#MV_ADD&amp;nbsp;=&amp;nbsp;true&lt;/SPAN&gt;&lt;/DIV&gt;&lt;DIV&gt;&lt;SPAN&gt;#REPEAT_MATCH&amp;nbsp;=&amp;nbsp;true&lt;/SPAN&gt;&lt;/DIV&gt;&lt;DIV&gt;&lt;SPAN&gt;#CLEAN_KEYS&amp;nbsp;=&amp;nbsp;false&lt;/SPAN&gt;&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;P&gt;3) where did you write the props and transforms?&lt;/P&gt;&lt;P&gt;In Search Head Deployer&lt;/P&gt;&lt;P&gt;4) have you restarted splunk instance after updating props and transforms ?&lt;/P&gt;&lt;P&gt;Yes, we restarted if any changes done we do always restart and bundle push as well&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Actually this is we are taking sample events from Prod and uploading in UAT there we are trying. And index we created in indexer for this custom app&lt;/P&gt;</description>
      <pubDate>Fri, 08 Apr 2022 13:53:12 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise/How-to-Extract-Fields-from-raw-events-with-regex/m-p/593116#M12173</guid>
      <dc:creator>pchintha</dc:creator>
      <dc:date>2022-04-08T13:53:12Z</dc:date>
    </item>
    <item>
      <title>Re: Fields Extraction from raw events with regex</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise/How-to-Extract-Fields-from-raw-events-with-regex/m-p/593123#M12174</link>
      <description>&lt;P&gt;Any update by chance&lt;/P&gt;</description>
      <pubDate>Fri, 08 Apr 2022 14:44:53 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise/How-to-Extract-Fields-from-raw-events-with-regex/m-p/593123#M12174</guid>
      <dc:creator>pchintha</dc:creator>
      <dc:date>2022-04-08T14:44:53Z</dc:date>
    </item>
    <item>
      <title>Re: Fields Extraction from raw events with regex</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise/How-to-Extract-Fields-from-raw-events-with-regex/m-p/593126#M12176</link>
      <description>&lt;P&gt;Hi for the search to work you would have to write this :&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;&amp;lt;your base search&amp;gt;
| extract kvdelim=":" pairdelim="," 
| rex "Server\s*:\s*(?&amp;lt;Server&amp;gt;[^\,]+)"&lt;/LI-CODE&gt;&lt;P&gt;props.conf and transforms.conf is best to put on the heavy forwarder if you have one or the indexing layer.&lt;/P&gt;&lt;P&gt;The regex that I provided is for transforms only and it works well for all the events that you have given.&lt;/P&gt;&lt;P&gt;&lt;A href="https://regex101.com/r/0rdToo/1" target="_blank"&gt;https://regex101.com/r/0rdToo/1&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;use below configuration on HF or Indexers.&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;props.conf
[ssc_cloakware]
REPORT-extractions = field_extractions
 
transforms.conf
[field_extractions]
REGEX = \s([^\:]+)\:\s+([^\,]+)
FORMAT = $1::$2&lt;/LI-CODE&gt;&lt;P&gt;Restart the instance after editing the configuration.&amp;nbsp;&lt;/P&gt;&lt;P&gt;I am gonna test this configuration on my lab instance. meanwhile you do the same.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 08 Apr 2022 14:58:03 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise/How-to-Extract-Fields-from-raw-events-with-regex/m-p/593126#M12176</guid>
      <dc:creator>mayurr98</dc:creator>
      <dc:date>2022-04-08T14:58:03Z</dc:date>
    </item>
    <item>
      <title>Re: Fields Extraction from raw events with regex</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise/How-to-Extract-Fields-from-raw-events-with-regex/m-p/593254#M12193</link>
      <description>&lt;P&gt;Hi Sorry for late responding, as you said i did same its working in the props.conf and transforms.conf but except the &lt;STRONG&gt;Server&lt;/STRONG&gt; field in the logs, can you please share the extract field for the &lt;STRONG&gt;Server&lt;/STRONG&gt; for transforms.conf&lt;/P&gt;</description>
      <pubDate>Mon, 11 Apr 2022 07:33:22 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise/How-to-Extract-Fields-from-raw-events-with-regex/m-p/593254#M12193</guid>
      <dc:creator>pchintha</dc:creator>
      <dc:date>2022-04-11T07:33:22Z</dc:date>
    </item>
    <item>
      <title>Re: Fields Extraction from raw events with regex</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise/How-to-Extract-Fields-from-raw-events-with-regex/m-p/593378#M12204</link>
      <description>&lt;P&gt;Hi, please update for this&lt;/P&gt;</description>
      <pubDate>Tue, 12 Apr 2022 03:04:39 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise/How-to-Extract-Fields-from-raw-events-with-regex/m-p/593378#M12204</guid>
      <dc:creator>pchintha</dc:creator>
      <dc:date>2022-04-12T03:04:39Z</dc:date>
    </item>
    <item>
      <title>Re: Fields Extraction from raw events with regex</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise/How-to-Extract-Fields-from-raw-events-with-regex/m-p/593388#M12205</link>
      <description>&lt;P&gt;Put below in props.conf&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;props.conf
[ssc_cloakware]
REPORT-extractions = field_extractions
EXTRACT-server = Server\s*:\s*(?&amp;lt;Server&amp;gt;[^\,]+)&lt;/LI-CODE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;This is search time field extraction so make sure you write this regex in SH.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;OR simply go to search head:&lt;/P&gt;&lt;DIV class=""&gt;&lt;DIV class=""&gt;&lt;DIV class=""&gt;Settings&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;»&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;Fields »&lt;SPAN&gt;&amp;nbsp;Field Extractions&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;»&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;Add new&lt;/DIV&gt;&lt;DIV class=""&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV class=""&gt;&amp;nbsp;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;Destination App: &amp;lt;Choose appropriate app&amp;gt;
Name: Server
Apply to: Sourcetype: &amp;lt;sourcetype_name&amp;gt;
Extraction/Transform:  Server\s*:\s*(?&amp;lt;Server&amp;gt;[^\,]+)&lt;/LI-CODE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;DIV class=""&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV class=""&gt;&amp;nbsp;&lt;/DIV&gt;&lt;P&gt;Please upvote/accept to close this question if it works for you.&lt;/P&gt;</description>
      <pubDate>Tue, 12 Apr 2022 05:04:45 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise/How-to-Extract-Fields-from-raw-events-with-regex/m-p/593388#M12205</guid>
      <dc:creator>mayurr98</dc:creator>
      <dc:date>2022-04-12T05:04:45Z</dc:date>
    </item>
    <item>
      <title>Re: Fields Extraction from raw events with regex</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise/How-to-Extract-Fields-from-raw-events-with-regex/m-p/618796#M14339</link>
      <description>&lt;P&gt;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/172209"&gt;@mayurr98&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Here is my search that I want to put into props &amp;amp; transform.&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;index=nsips_horizon sourcetype="vmware:uag:esmanager" 
| rex "^(?:[^ \n]* ){3}(?P&amp;lt;UAG_hostname&amp;gt;[a-z]+\d+)\s+(?P&amp;lt;app_name&amp;gt;[^:]+)[^:\n]*:\s+\[(?P&amp;lt;thread_id&amp;gt;\S+?)\](?P&amp;lt;log_level&amp;gt;[^ ]+)\s+(?P&amp;lt;file_name&amp;gt;[^\[]+)\[(?P&amp;lt;function_name&amp;gt;[^:]+):\s+(?P&amp;lt;line_num&amp;gt;[^\]]+)[^\[\n]*\[(?P&amp;lt;client_IP&amp;gt;[^\]]+|.?)\]\[(?P&amp;lt;username&amp;gt;.+|.?)\]\[(?P&amp;lt;session_type&amp;gt;.+|.?)\]\[(?P&amp;lt;session_id&amp;gt;[^\]]+)[^\]\n]*\]\s+\-\s+(?P&amp;lt;message&amp;gt;.+)"&lt;/LI-CODE&gt;&lt;P&gt;here is sample log:&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;Sep 9 05:36:55 UAG Name UAG-ESMANAGER: [Curator-QueueBuilder-0]INFO utils.SyslogManager[start: 355][][][][] - Edge Service Manager : started
Sep 9 05:36:54 UAG Name UAG-ESMANAGER: [Curator-QueueBuilder-0]INFO utils.SyslogManager[stop: 1071][][][][] - Edge Service Manager : stopped&lt;/LI-CODE&gt;&lt;P&gt;based on what I read the props.conf&amp;nbsp;&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;[vmware:uag:esmanager]
REPORT-esmanager = esmanager&lt;/LI-CODE&gt;&lt;P&gt;Transform.conf&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;[esmanager]
REGEX = ^(?:[^ \n]* ){3}(?P&amp;lt;UAG_hostname&amp;gt;[a-z]+\d+)\s+(?P&amp;lt;app_name&amp;gt;[^:]+)[^:\n]*:\s+\[(?P&amp;lt;thread_id&amp;gt;\S+?)\](?P&amp;lt;log_level&amp;gt;[^ ]+)\s+(?P&amp;lt;file_name&amp;gt;[^\[]+)\[(?P&amp;lt;function_name&amp;gt;[^:]+):\s+(?P&amp;lt;line_num&amp;gt;[^\]]+)[^\[\n]*\[(?P&amp;lt;client_IP&amp;gt;[^\]]+|.?)\]\[(?P&amp;lt;username&amp;gt;.+|.?)\]\[(?P&amp;lt;session_type&amp;gt;.+|.?)\]\[(?P&amp;lt;session_id&amp;gt;[^\]]+)[^\]\n]*\]\s+\-\s+(?P&amp;lt;message&amp;gt;.+)
FORMAT = $1::$2&lt;/LI-CODE&gt;&lt;P&gt;Right?&amp;nbsp; What's $1::$2 doing?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 28 Oct 2022 20:09:28 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise/How-to-Extract-Fields-from-raw-events-with-regex/m-p/618796#M14339</guid>
      <dc:creator>youngsuh</dc:creator>
      <dc:date>2022-10-28T20:09:28Z</dc:date>
    </item>
  </channel>
</rss>

