<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ReGex for certain data in Splunk Enterprise</title>
    <link>https://community.splunk.com/t5/Splunk-Enterprise/Help-with-ReGex-for-certain-data/m-p/610604#M13720</link>
    <description>&lt;P&gt;You have two values (same) in the data. So, you can do this to extract and filter out the duplicates&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;| rex max_match=0  "TCP from (?&amp;lt;TCP&amp;gt;\d{1,3}\.\d{1,3}\.\d{1,3}\.\d{1,3})"
| eval TCP=mvdedup(TCP)&lt;/LI-CODE&gt;</description>
    <pubDate>Wed, 24 Aug 2022 04:10:51 GMT</pubDate>
    <dc:creator>bowesmana</dc:creator>
    <dc:date>2022-08-24T04:10:51Z</dc:date>
    <item>
      <title>Help with ReGex for certain data</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise/Help-with-ReGex-for-certain-data/m-p/610600#M13719</link>
      <description>&lt;P&gt;Hi peeps,&lt;/P&gt;
&lt;P&gt;Need help in extracting some fields;&lt;/P&gt;
&lt;P&gt;Sample logs:&lt;/P&gt;
&lt;P&gt;Aug 24 09:30:43 101.11.10.01 CEF:0|KasperskyLab|SecurityCenter|13.2.0.1511|GNRL_EV_ATTACK_DETECTED|Network attack detected|4|msg=User: NT AUTHORITY\\SYSTEM (System user)\r\nComponent: Network Threat Protection\r\nResult description: Blocked\r\nName: Scan.Generic.PortScan.TCP\r\nObject: &lt;STRONG&gt;&lt;FONT color="#FF0000"&gt;TCP from &lt;U&gt;101.11.10.01&lt;/U&gt;&lt;/FONT&gt;&lt;/STRONG&gt; at 101.11.10.01:25\r\nObject type: Network packet\r\nObject name: TCP from 101.11.10.01 at 101.11.10.01\r\nAdditional: 101.11.10.01\r\nDatabase release date: 23/8/2022 12:26:00 PM rt=1661304218000 cs9=Workstation cs9Label=GroupName dhost=082HALIM141 dst=101.11.10.01 cs2=KES cs2Label=ProductName cs3=11.0.0.0 cs3Label=ProductVersion cs10=Network Threat Protection cs10Label=TaskName cs1=Scan.Generic.PortScan.TCP cs1Label=AttackName cs6=TCP cs6Label=AttackedProtocol cs4=2887053442 cs4Label=AttackerIPv4 cs7=25 cs7Label=AttackedPort cs8=2887125841 cs8Label=AttackedIP&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Aug 24 09:30:43 101.11.10.01 CEF:0|KasperskyLab|SecurityCenter|13.2.0.1511|GNRL_EV_ATTACK_DETECTED|Network attack detected|4|msg=User: NT AUTHORITY\\SYSTEM (System user)\r\nComponent: Network Threat Protection\r\nResult description: Blocked\r\nName: Scan.Generic.PortScan.TCP\r\nObject: TCP from 101.11.10.01 at 101.11.10.01:42666\r\nObject type: Network packet\r\nObject name: &lt;FONT color="#FF0000"&gt;&lt;STRONG&gt;TCP from &lt;U&gt;101.11.10.01&lt;/U&gt;&lt;/STRONG&gt;&lt;/FONT&gt; at 101.11.10.01:42666\r\nAdditional: 101.11.10.01\r\nDatabase release date: 23/8/2022 12:26:00 PM rt=1661304218000 cs9=Workstation cs9Label=GroupName dhost=082HALIM141 dst=101.11.10.01 cs2=KES cs2Label=ProductName cs3=11.0.0.0 cs3Label=ProductVersion cs10=Network Threat Protection cs10Label=TaskName cs1=Scan.Generic.PortScan.TCP cs1Label=AttackName cs6=TCP cs6Label=AttackedProtocol cs4=2887053442 cs4Label=AttackerIPv4 cs7=42666 cs7Label=AttackedPort cs8=2887125841 cs8Label=AttackedIP&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I need help to extract the underline value for fields name TCP.&lt;/P&gt;
&lt;P&gt;Sample:&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;TCP=&lt;FONT color="#000000"&gt;101.11.10.01&lt;/FONT&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;Please help. Thanks.&lt;/P&gt;</description>
      <pubDate>Wed, 24 Aug 2022 14:22:41 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise/Help-with-ReGex-for-certain-data/m-p/610600#M13719</guid>
      <dc:creator>syazwani</dc:creator>
      <dc:date>2022-08-24T14:22:41Z</dc:date>
    </item>
    <item>
      <title>Re: ReGex for certain data</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise/Help-with-ReGex-for-certain-data/m-p/610604#M13720</link>
      <description>&lt;P&gt;You have two values (same) in the data. So, you can do this to extract and filter out the duplicates&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;| rex max_match=0  "TCP from (?&amp;lt;TCP&amp;gt;\d{1,3}\.\d{1,3}\.\d{1,3}\.\d{1,3})"
| eval TCP=mvdedup(TCP)&lt;/LI-CODE&gt;</description>
      <pubDate>Wed, 24 Aug 2022 04:10:51 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise/Help-with-ReGex-for-certain-data/m-p/610604#M13720</guid>
      <dc:creator>bowesmana</dc:creator>
      <dc:date>2022-08-24T04:10:51Z</dc:date>
    </item>
  </channel>
</rss>

