<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: SEDCMD log filtering regex needed in Getting Data In</title>
    <link>https://community.splunk.com/t5/Getting-Data-In/How-to-achieve-regex-to-keep-the-highlighted-parts-from-the/m-p/647138#M110046</link>
    <description>&lt;LI-CODE lang="markup"&gt;| rex mode=sed "s/(?:^.*)(?&amp;lt;cip&amp;gt;c-ip=\S+)\s.*(?&amp;lt;csbytes&amp;gt;cs-bytes=\S+)\s.*(?&amp;lt;csip&amp;gt;cs-ip=\S+)\s.*(?&amp;lt;csmethod&amp;gt;cs-method=\S+)\s.*(?&amp;lt;csusername&amp;gt;cs-username=\S+)\s.*(?&amp;lt;sip&amp;gt;s-ip=\S+)\s.*(?&amp;lt;ssupplierip&amp;gt;s-supplier-ip=\S+)\s.*(?&amp;lt;csreferer&amp;gt;cs-Referer=\S+)\s.*(?&amp;lt;csauthgroups&amp;gt;cs-auth-groups=\S+)\s.*(?&amp;lt;csthreatrisk&amp;gt;cs-threat-risk=\S+)\s.*(?&amp;lt;rip&amp;gt;r-ip=\S+)\s.*(?&amp;lt;xcsrefererurihostname&amp;gt;x-cs-Referer-uri-hostname=\S+)\s.*/\1 \2 \3 \4 \5 \6 \7 \8 \9 \10 \11 \12/g"&lt;/LI-CODE&gt;</description>
    <pubDate>Thu, 15 Jun 2023 11:19:11 GMT</pubDate>
    <dc:creator>ITWhisperer</dc:creator>
    <dc:date>2023-06-15T11:19:11Z</dc:date>
    <item>
      <title>How to achieve regex to keep the highlighted  parts from the below raw log and remove the rest using SEDCMD?</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/How-to-achieve-regex-to-keep-the-highlighted-parts-from-the/m-p/647132#M110044</link>
      <description>&lt;P&gt;Hello community,&lt;/P&gt;
&lt;P&gt;I am looking for a regex to keep the highlighted&amp;nbsp; parts from the below raw log and remove the rest using SEDCMD&lt;/P&gt;
&lt;P&gt;&lt;FONT color="#FF0000"&gt;&lt;STRONG&gt;c-ip=&lt;/STRONG&gt;&lt;/FONT&gt;&lt;SPAN&gt;&lt;FONT color="#FF0000"&gt;&lt;STRONG&gt;XXX.XXX.XXX.XXX&lt;/STRONG&gt;&lt;/FONT&gt; rs-Content-Type="application/javascript" cs-auth-groups="xxxxxx\ROLE.STD.MSTeams" &lt;FONT color="#FF0000"&gt;&lt;STRONG&gt;cs-bytes=888&lt;/STRONG&gt;&lt;/FONT&gt; cs-categories="Technology/Internet;NetSkope_XXX" cs-host=xxxxxxxx&amp;nbsp;&lt;FONT color="#FF0000"&gt;&lt;STRONG&gt;cs-ip=XXX.XXX.XXX.XXX&lt;/STRONG&gt;&lt;/FONT&gt; &lt;STRONG&gt;&lt;FONT color="#FF0000"&gt;cs-method=GET&lt;/FONT&gt;&lt;/STRONG&gt; cs-uri-port=443 cs-uri-scheme=https cs-User-Agent="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Teams/1.6.00.12455 Chrome/ XXX.XXX.XXX.XXX Electron/XX.1.8 Safari/5XX.3X"&lt;STRONG&gt; &lt;FONT color="#FF0000"&gt;cs-username=XXXX&lt;/FONT&gt;&lt;/STRONG&gt; dnslookup-time=0 duration=0 rs-status=200 rs-version=HTTP/1.1 s-action=TCP_HIT &lt;FONT color="#FF0000"&gt;s-&lt;STRONG&gt;ip=XXX.XXX.XXX.XXX&lt;/STRONG&gt;&lt;/FONT&gt; &lt;A href="http://service.name" target="_blank" rel="noopener"&gt;service.name&lt;/A&gt;="XXXXX HTTP" service.group="Standard" &lt;STRONG&gt;&lt;FONT color="#FF0000"&gt;s-supplier-ip=XXX.XXX.XXX.XXX&lt;/FONT&gt;&lt;/STRONG&gt; s-supplier-name=XXX.XXX.XXX.XXX sc-bytes=1XXX711 sc-filter-result=OBSERVED sc-status=200 time-taken=31 c-url="&lt;A href="https://xxxxxxxx.net/midgard/versionless/livepersonacardstrings_f8axxxad2fc4867bf1300xxxx06c7057c23.js" target="_blank" rel="noopener"&gt;/xxxxxxxx.net/midgard/versionless/livepersonacardstrings_f8axxxad2fc4867bf1300xxxx06c7057c23.js&lt;/A&gt;" &lt;STRONG&gt;&lt;FONT color="#FF0000"&gt;cs-Referer="&lt;A href="http://httpsxxx.com/" target="_blank" rel="noopener"&gt;httpsxxx.com/&lt;/A&gt;"&lt;/FONT&gt; &lt;FONT color="#FF0000"&gt;cs-auth-groups="ccccccc\ROLE.STD.MSTeams"&lt;/FONT&gt;&lt;/STRONG&gt; cs-headerlength=667 &lt;STRONG&gt;&lt;FONT color="#FF0000"&gt;cs-threat-risk=2&lt;/FONT&gt; &lt;FONT color="#FF0000"&gt;r-ip=XXX.XXX.XXX.XXX&lt;/FONT&gt;&lt;/STRONG&gt; s-connect-type=Unknown s-icap-status=ICAP_NOT_SCANNED s-sitename=https.forward-proxy s-source-port=0 s-supplier-country="None" sr-Accept-Encoding=gzip,%20deflate,%20br,%20identity x-auth-credential-type=NTLM x-cookie-date=Thu,%2015-Jun-23%2009:15:15%20GMT x-cs-connection-negotiated-cipher=XXXX_256_GCM_SHA384 x-cs-connection-negotiated-cipher-size=256 x-cs-connection-negotiated-ssl-version=TLSv1.3 x-cs-Referer-uri=&lt;A href="https://teams.microsoft.com/" target="_blank" rel="noopener"&gt;https://teams.microsoft.com/&lt;/A&gt; x-cs-Referer-uri-address=XXX.XXX.XXX.XXX x-cs-Referer-uri-host=&lt;A href="http://teams.microsoft.com" target="_blank" rel="noopener"&gt;teams.microsoft.com&lt;/A&gt; &lt;STRONG&gt;&lt;FONT color="#FF0000"&gt;x-cs-Referer-uri-hostname=&lt;A href="http://teams.microsoft.com" target="_blank" rel="noopener"&gt;teams.microsoft.com&lt;/A&gt;&lt;/FONT&gt;&lt;/STRONG&gt; x-cs-Referer-uri-port=XXX x-cs-Referer-uri-scheme=https x-cs-Referer-uri-stem=&lt;A href="https://teams.microsoft.com/" target="_blank" rel="noopener"&gt;https://teams.microsoft.com/&lt;/A&gt; x-exception-sourceline=0 x-rs-certificate-hostnamexxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxertificate-observed-errors=none x-rs-certificate-xxxxxxxxxxxxxxxnet" x-rs-certificate-validate-status=CERT_VALID x-rs-connection-negotiated-cipher=TLS_AES_256_GCM_SHA384 x-rs-connection-negotiated-cipher-size=256 x-rs-connection-negotiated-ssl-version=TLSv1.3 cs-uri-extension=js cs-uri-path=/midgard/versionless/livepersonacardstrings_f8aa070xxxxxxxxx4867bf13000eac47f306c7057c23.js c-uri-pathquery=/midgard/versionless/livepersonacardstrings_f8aa070ad2fc4867bf1300xxxxxxxxxxxc7057c23.js&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Thank you!&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 16 Jun 2023 13:59:45 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/How-to-achieve-regex-to-keep-the-highlighted-parts-from-the/m-p/647132#M110044</guid>
      <dc:creator>DanAlexander</dc:creator>
      <dc:date>2023-06-16T13:59:45Z</dc:date>
    </item>
    <item>
      <title>Re: SEDCMD log filtering regex needed</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/How-to-achieve-regex-to-keep-the-highlighted-parts-from-the/m-p/647138#M110046</link>
      <description>&lt;LI-CODE lang="markup"&gt;| rex mode=sed "s/(?:^.*)(?&amp;lt;cip&amp;gt;c-ip=\S+)\s.*(?&amp;lt;csbytes&amp;gt;cs-bytes=\S+)\s.*(?&amp;lt;csip&amp;gt;cs-ip=\S+)\s.*(?&amp;lt;csmethod&amp;gt;cs-method=\S+)\s.*(?&amp;lt;csusername&amp;gt;cs-username=\S+)\s.*(?&amp;lt;sip&amp;gt;s-ip=\S+)\s.*(?&amp;lt;ssupplierip&amp;gt;s-supplier-ip=\S+)\s.*(?&amp;lt;csreferer&amp;gt;cs-Referer=\S+)\s.*(?&amp;lt;csauthgroups&amp;gt;cs-auth-groups=\S+)\s.*(?&amp;lt;csthreatrisk&amp;gt;cs-threat-risk=\S+)\s.*(?&amp;lt;rip&amp;gt;r-ip=\S+)\s.*(?&amp;lt;xcsrefererurihostname&amp;gt;x-cs-Referer-uri-hostname=\S+)\s.*/\1 \2 \3 \4 \5 \6 \7 \8 \9 \10 \11 \12/g"&lt;/LI-CODE&gt;</description>
      <pubDate>Thu, 15 Jun 2023 11:19:11 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/How-to-achieve-regex-to-keep-the-highlighted-parts-from-the/m-p/647138#M110046</guid>
      <dc:creator>ITWhisperer</dc:creator>
      <dc:date>2023-06-15T11:19:11Z</dc:date>
    </item>
    <item>
      <title>Re: SEDCMD log filtering regex needed</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/How-to-achieve-regex-to-keep-the-highlighted-parts-from-the/m-p/647180#M110053</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/225168"&gt;@ITWhisperer&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;Awesome as always. Worked first time.&lt;/P&gt;&lt;P&gt;I wanted to ask would you be willing to help me out with the following, please?&lt;/P&gt;&lt;P&gt;I need help reducing Events containing 4688 and ParentProcessName=*splunkd.exe&lt;/P&gt;&lt;P&gt;There is an excerpt from the log:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;SPAN&gt;&amp;lt;Event xmlns='&lt;/SPAN&gt;&lt;A href="http://schemas.microsoft.com/win/2004/08/events/event" target="_blank" rel="noopener nofollow noreferrer"&gt;http://schemas.microsoft.com/win/2004/08/events/event&lt;/A&gt;&lt;SPAN&gt;'&amp;gt;&amp;lt;System&amp;gt;&amp;lt;Provider Name='Microsoft-Windows-Security-Auditing' Guid=' XXXXXXXX -4994-a5ba-3e3b0328c30d}'/&amp;gt;&amp;lt;EventID&amp;gt;4688&amp;lt;/EventID&amp;gt;&amp;lt;Version&amp;gt;2&amp;lt;/Version&amp;gt;&amp;lt;Level&amp;gt;0&amp;lt;/Level&amp;gt;&amp;lt;Task&amp;gt;13312&amp;lt;/Task&amp;gt;&amp;lt;Opcode&amp;gt;0&amp;lt;/Opcode&amp;gt;&amp;lt;Keywords&amp;gt;0x8020000000000000&amp;lt;/Keywords&amp;gt;&amp;lt;TimeCreated SystemTime='2023-06-13T10:39:41.797279900Z'/&amp;gt;&amp;lt;EventRecordID&amp;gt;12536409&amp;lt;/EventRecordID&amp;gt;&amp;lt;Correlation/&amp;gt;&amp;lt;Execution ProcessID='4' ThreadID='15216'/&amp;gt;&amp;lt;Channel&amp;gt;Security&amp;lt;/Channel&amp;gt;&amp;lt;Computer&amp;gt; XXXXXXXX &amp;lt;/Computer&amp;gt;&amp;lt;Security/&amp;gt;&amp;lt;/System&amp;gt;&amp;lt;EventData&amp;gt;&amp;lt;Data Name='SubjectUserSid'&amp;gt;S-1-5-18&amp;lt;/Data&amp;gt;&amp;lt;Data Name='SubjectUserName'&amp;gt;XXXXXXXX&amp;lt;/Data&amp;gt;&amp;lt;Data Name='SubjectDomainName'&amp;gt; XXXXXXXX &amp;lt;/Data&amp;gt;&amp;lt;Data Name='SubjectLogonId'&amp;gt;0 XXXXXXXX 7&amp;lt;/Data&amp;gt;&amp;lt;Data Name='NewProcessId'&amp;gt;0x2734&amp;lt;/Data&amp;gt;&amp;lt;Data Name='NewProcessName'&amp;gt;C:\Program Files\SplunkUniversalForwarder\bin\splunk-MonitorNoHandle.exe&amp;lt;/Data&amp;gt;&amp;lt;Data Name='TokenElevationType'&amp;gt;%%1936&amp;lt;/Data&amp;gt;&amp;lt;Data Name='ProcessId'&amp;gt;0x17d4&amp;lt;/Data&amp;gt;&amp;lt;Data Name='CommandLine'&amp;gt;&amp;lt;/Data&amp;gt;&amp;lt;Data Name='TargetUserSid'&amp;gt;S-1-0-0&amp;lt;/Data&amp;gt;&amp;lt;Data Name='TargetUserName'&amp;gt;-&amp;lt;/Data&amp;gt;&amp;lt;Data Name='TargetDomainName'&amp;gt;-&amp;lt;/Data&amp;gt;&amp;lt;Data Name='TargetLogonId'&amp;gt;0x0&amp;lt;/Data&amp;gt;&amp;lt;Data Name='ParentProcessName'&amp;gt;C:\Program Files\SplunkUniversalForwarder\bin\splunkd.exe&amp;lt;/Data&amp;gt;&amp;lt;Data Name='MandatoryLabel'&amp;gt;XXXXXXXX -16384&amp;lt;/Data&amp;gt;&amp;lt;/EventData&amp;gt;&amp;lt;/Event&amp;gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;Can anyone help me create the appropriate regex I can use within the SEDCMD?&lt;/P&gt;&lt;P&gt;After the reduction the above event the result I am after should look something like this:&amp;nbsp;&lt;SPAN&gt;&amp;lt;EventID&amp;gt;4688&amp;lt;/EventID&amp;gt;&lt;/SPAN&gt;&lt;SPAN&gt;&amp;lt;Data Name='ParentProcessName'&amp;gt;C:\Program Files\SplunkUniversalForwarder\bin\splunkd.exe&amp;lt;/Data&amp;gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;Is the stanza I need to place this looks like this: [WinEventLog]&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Thank you!&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 15 Jun 2023 15:21:04 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/How-to-achieve-regex-to-keep-the-highlighted-parts-from-the/m-p/647180#M110053</guid>
      <dc:creator>DanAlexander</dc:creator>
      <dc:date>2023-06-15T15:21:04Z</dc:date>
    </item>
    <item>
      <title>Re: SEDCMD log filtering regex needed</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/How-to-achieve-regex-to-keep-the-highlighted-parts-from-the/m-p/647739#M110144</link>
      <description>&lt;P&gt;Here's how to do it in SPL:&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;| makeresults
| fields - _time
| eval _raw=" &amp;lt;Event xmlns='http://schemas.microsoft.com/win/2004/08/events/event'&amp;gt;&amp;lt;System&amp;gt;&amp;lt;Provider Name='Microsoft-Windows-Security-Auditing' Guid=' XXXXXXXX -4994-a5ba-3e3b0328c30d}'/&amp;gt;&amp;lt;EventID&amp;gt;4688&amp;lt;/EventID&amp;gt;&amp;lt;Version&amp;gt;2&amp;lt;/Version&amp;gt;&amp;lt;Level&amp;gt;0&amp;lt;/Level&amp;gt;&amp;lt;Task&amp;gt;13312&amp;lt;/Task&amp;gt;&amp;lt;Opcode&amp;gt;0&amp;lt;/Opcode&amp;gt;&amp;lt;Keywords&amp;gt;0x8020000000000000&amp;lt;/Keywords&amp;gt;&amp;lt;TimeCreated SystemTime='2023-06-13T10:39:41.797279900Z'/&amp;gt;&amp;lt;EventRecordID&amp;gt;12536409&amp;lt;/EventRecordID&amp;gt;&amp;lt;Correlation/&amp;gt;&amp;lt;Execution ProcessID='4' ThreadID='15216'/&amp;gt;&amp;lt;Channel&amp;gt;Security&amp;lt;/Channel&amp;gt;&amp;lt;Computer&amp;gt; XXXXXXXX &amp;lt;/Computer&amp;gt;&amp;lt;Security/&amp;gt;&amp;lt;/System&amp;gt;&amp;lt;EventData&amp;gt;&amp;lt;Data Name='SubjectUserSid'&amp;gt;S-1-5-18&amp;lt;/Data&amp;gt;&amp;lt;Data Name='SubjectUserName'&amp;gt;XXXXXXXX&amp;lt;/Data&amp;gt;&amp;lt;Data Name='SubjectDomainName'&amp;gt; XXXXXXXX &amp;lt;/Data&amp;gt;&amp;lt;Data Name='SubjectLogonId'&amp;gt;0 XXXXXXXX 7&amp;lt;/Data&amp;gt;&amp;lt;Data Name='NewProcessId'&amp;gt;0x2734&amp;lt;/Data&amp;gt;&amp;lt;Data Name='NewProcessName'&amp;gt;C:\Program Files\SplunkUniversalForwarder\bin\splunk-MonitorNoHandle.exe&amp;lt;/Data&amp;gt;&amp;lt;Data Name='TokenElevationType'&amp;gt;%%1936&amp;lt;/Data&amp;gt;&amp;lt;Data Name='ProcessId'&amp;gt;0x17d4&amp;lt;/Data&amp;gt;&amp;lt;Data Name='CommandLine'&amp;gt;&amp;lt;/Data&amp;gt;&amp;lt;Data Name='TargetUserSid'&amp;gt;S-1-0-0&amp;lt;/Data&amp;gt;&amp;lt;Data Name='TargetUserName'&amp;gt;-&amp;lt;/Data&amp;gt;&amp;lt;Data Name='TargetDomainName'&amp;gt;-&amp;lt;/Data&amp;gt;&amp;lt;Data Name='TargetLogonId'&amp;gt;0x0&amp;lt;/Data&amp;gt;&amp;lt;Data Name='ParentProcessName'&amp;gt;C:\Program Files\SplunkUniversalForwarder\bin\splunkd.exe&amp;lt;/Data&amp;gt;&amp;lt;Data Name='MandatoryLabel'&amp;gt;XXXXXXXX -16384&amp;lt;/Data&amp;gt;&amp;lt;/EventData&amp;gt;&amp;lt;/Event&amp;gt;"
| rex mode=sed "s/.*(?&amp;lt;eventId&amp;gt;&amp;lt;EventID&amp;gt;4688&amp;lt;\/EventID&amp;gt;).*(?&amp;lt;parentProcess&amp;gt;&amp;lt;Data Name='ParentProcessName'&amp;gt;C:\\\\Program Files\\\\SplunkUniversalForwarder\\\\bin\\\\splunkd.exe&amp;lt;\/Data&amp;gt;).*/\1\2/g"&lt;/LI-CODE&gt;&lt;P&gt;For SEDCMD, you might need fewer backslashes:&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;s/.*(?&amp;lt;eventId&amp;gt;&amp;lt;EventID&amp;gt;4688&amp;lt;\/EventID&amp;gt;).*(?&amp;lt;parentProcess&amp;gt;&amp;lt;Data Name='ParentProcessName'&amp;gt;C:\\Program Files\\SplunkUniversalForwarder\\bin\\splunkd.exe&amp;lt;\/Data&amp;gt;).*/\1\2/g&lt;/LI-CODE&gt;</description>
      <pubDate>Wed, 21 Jun 2023 08:55:49 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/How-to-achieve-regex-to-keep-the-highlighted-parts-from-the/m-p/647739#M110144</guid>
      <dc:creator>ITWhisperer</dc:creator>
      <dc:date>2023-06-21T08:55:49Z</dc:date>
    </item>
    <item>
      <title>Re: SEDCMD log filtering regex needed</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/How-to-achieve-regex-to-keep-the-highlighted-parts-from-the/m-p/647743#M110145</link>
      <description>&lt;P&gt;Thank you for replying back&amp;nbsp;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/225168"&gt;@ITWhisperer&lt;/a&gt;&amp;nbsp;Much appreciated!&lt;/P&gt;&lt;P&gt;I do struggle at the moment with the sourcetype/source within the props.conf&lt;/P&gt;&lt;P&gt;I did put lots of entries but not sure why this still not reducing the logs&lt;/P&gt;&lt;P&gt;I used:&lt;/P&gt;&lt;P&gt;[WinEventLog]&lt;/P&gt;&lt;P&gt;SEDCMD=regex_here&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;[wineventlog]&lt;/P&gt;&lt;P&gt;SEDCMD=s/.*/ParentProcessName/g&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;[xmlwineventlog]&lt;/P&gt;&lt;P&gt;SEDCMD=regex_here&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;[XmlWinEventLog]&lt;/P&gt;&lt;P&gt;SEDCMD=regex_here&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;[source::WinEventLog:Security]&lt;/P&gt;&lt;P&gt;SEDCMD=regex_here&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;[WinEventLog:Security]&lt;/P&gt;&lt;P&gt;SEDCMD=regex_here&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;[WinEventLog:ForwardedEvents]&lt;/P&gt;&lt;P&gt;SEDCMD=regex_here&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;[source::WinEventLog:ForwardedEvents]&lt;/P&gt;&lt;P&gt;SEDCMD=regex_here&lt;/P&gt;&lt;P&gt;---------------------------&lt;/P&gt;&lt;P&gt;I am not sure what to use within the squared brackets to make this work.&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Dan&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 21 Jun 2023 09:11:42 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/How-to-achieve-regex-to-keep-the-highlighted-parts-from-the/m-p/647743#M110145</guid>
      <dc:creator>DanAlexander</dc:creator>
      <dc:date>2023-06-21T09:11:42Z</dc:date>
    </item>
  </channel>
</rss>

