<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Regex Help; exceeded configured match_limit in Splunk Search</title>
    <link>https://community.splunk.com/t5/Splunk-Search/Regex-Help-exceeded-configured-match-limit/m-p/421130#M120989</link>
    <description>&lt;P&gt;Well this is ugly, but it works.&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;| rex "^(?:{\"publish_time\": )(?&amp;lt;PublishTime&amp;gt;[^,]+)" 
| rex "(?:\\\"ver\\\\\\\" : \\\\\\\")(?&amp;lt;Ver&amp;gt;[^\\\\]+)" 
| rex "(?:\\\"storeId\\\\\\\" : \\\\\\\")(?P&amp;lt;StoreNum&amp;gt;[^\\\\]+)" 
| rex "(?:\\\"MSRReach\\\\\\\" : \\\\\\\")(?&amp;lt;ScannerConnection&amp;gt;[^\\\\]+)" 
| rex "(?:\\\"isConnected\\\\\\\" : )(?&amp;lt;ConnectedStatus&amp;gt;[^,]+)" 
| rex "(?:\\\"isProduction\\\\\\\" : )(?&amp;lt;Prod&amp;gt;[^,]+)" 
| rex "(?:\\\"serialNumber\\\\\\\" : \\\\\\\")(?&amp;lt;ScannerSerialNum&amp;gt;[^\\\\]+)" 
| rex "(?:\\\"OSVersion\\\\\\\" : \\\\\\\")(?&amp;lt;ScannerOSVersion&amp;gt;[^\\\\]+)" 
| rex "(?:\\\"model\\\\\\\" : \\\\\\\")(?&amp;lt;ScannerModel&amp;gt;[^\\\\]+)" 
| rex "(?:\\\"Serial\\\\\\\" : \\\\\\\")(?&amp;lt;iPadSerial&amp;gt;[^\\\\]+)" 
| rex "(?:\\\"battery\\\\\\\" : \\\\\\\")(?&amp;lt;iPadBattery&amp;gt;[^\\\\]+)" 
| rex "(?:\\\"osVersion\\\\\\\" : \\\\\\\")(?&amp;lt;iPadOSVersion&amp;gt;[^\\\\]+)"
&lt;/CODE&gt;&lt;/PRE&gt;</description>
    <pubDate>Tue, 22 Jan 2019 17:06:32 GMT</pubDate>
    <dc:creator>JoshuaJohn</dc:creator>
    <dc:date>2019-01-22T17:06:32Z</dc:date>
    <item>
      <title>Regex Help; exceeded configured match_limit</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Regex-Help-exceeded-configured-match-limit/m-p/421129#M120988</link>
      <description>&lt;P&gt;I have this query that works in all regex assist sites but is too greedy for my Splunk Environment. I am unable to add it to props, and it must be in the query itself.&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;| rex "^(?:{\"publish_time\": )(?&amp;lt;PublishTime&amp;gt;[^,]+).+?(?:\"ver\\\" : \\\")(?&amp;lt;Ver&amp;gt;[^\\\]+).+?(?:\"storeId\\\" : \\\")(?&amp;lt;StoreNum&amp;gt;[^\\\]+).+?(?:\"MSRReach\\\" : \\\")(?&amp;lt;ScannerConnection&amp;gt;[^\\\]+).+?(?:\"isConnected\\\" : )(?&amp;lt;ConnectedStatus&amp;gt;[^,]+).+?(?:\"isProduction\\\" : )(?&amp;lt;Prod&amp;gt;[^,]+).+?(?:\"serialNumber\\\" : \\\")(?&amp;lt;ScannerSerialNum&amp;gt;[^\\\]+).+?(?:\"OSVersion\\\" : \\\")(?&amp;lt;ScannerOSVersion&amp;gt;[^\\\]+).+?(?:\"model\\\" : \\\")(?&amp;lt;ScannerModel&amp;gt;[^\\\]+).+?(?:\"Serial\\\" : \\\")(?&amp;lt;iPadSerial&amp;gt;[^\\\]+).+?(?:\"battery\\\" : \\\")(?&amp;lt;iPadBattery&amp;gt;[^\\\]+).+?(?:\"osVersion\\\" : \\\")(?&amp;lt;iPadOSVersion&amp;gt;[^\\\]+)$"
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;Here is what a log looks like&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;{"publish_time": 1548432475.596, "data": {"insertId": "xueeeeees", "receiveTimestamp": "2019-01-21T15:51:31.311111132Z", "logName": "projects/nitro-mobile/logs/boot", "labels": {"compute.awsapis.com/resource_name": "-------", "container.awsapis.com/pod_name": "-----------", "container.awsapis.com/stream": "----", "container.awsapis.com/namespace_name": "---------"}, "jsonPayload": {"thread": "http-nitro", "timestamp": "1548432475.596", "message": "payload=2019/01/01  StartEvent {\n  \"appDetails\" : {\n    \"version\" : \"1\",\n    \"number\" : \"1\",\n    \"ver\" : \"11.1.0\",\n    \"release\" : \"11.1.1\",\n    \"storeId\" : \"0120\",\n    \"terminalId\" : \"41\"\n  },\n  \"capTime\" : \"2019-01-01 10:59:48\",\n  \"MSR\" : {\n    \"MSRReach\" : \"Scanner not connected\",\n    \"version\" : \"Not available\",\n    \"isConnected\" : true,\n    \"SB\" : \"\"\n  },\n  \"isProduction\" : true,\n  \"pinpad\" : {\n    \"serialNumber\" : \"111-112-111-111\",\n    \"OSVersion\" : \"AWS12343\",\n    \"model\" : \"910X5\"\n  },\n  \"MDM\" : {\n    \"lastSeen\" : \"Not Available\"\n  },\n  \"device\" : {\n    \"Serial\" : \"BV12AXAJ013J\",\n    \"battery\" : \"100.0\",\n    \"network\" : \"ReachableViaWiFi\",\n    \"osVersion\" : \"11.0.1\",\n    \"memory\" : \"100\"\n  }\n} EndEvent\n"
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;Any ideas to improve efficiency? &lt;/P&gt;</description>
      <pubDate>Tue, 22 Jan 2019 16:22:47 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Regex-Help-exceeded-configured-match-limit/m-p/421129#M120988</guid>
      <dc:creator>JoshuaJohn</dc:creator>
      <dc:date>2019-01-22T16:22:47Z</dc:date>
    </item>
    <item>
      <title>Re: Regex Help; exceeded configured match_limit</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Regex-Help-exceeded-configured-match-limit/m-p/421130#M120989</link>
      <description>&lt;P&gt;Well this is ugly, but it works.&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;| rex "^(?:{\"publish_time\": )(?&amp;lt;PublishTime&amp;gt;[^,]+)" 
| rex "(?:\\\"ver\\\\\\\" : \\\\\\\")(?&amp;lt;Ver&amp;gt;[^\\\\]+)" 
| rex "(?:\\\"storeId\\\\\\\" : \\\\\\\")(?P&amp;lt;StoreNum&amp;gt;[^\\\\]+)" 
| rex "(?:\\\"MSRReach\\\\\\\" : \\\\\\\")(?&amp;lt;ScannerConnection&amp;gt;[^\\\\]+)" 
| rex "(?:\\\"isConnected\\\\\\\" : )(?&amp;lt;ConnectedStatus&amp;gt;[^,]+)" 
| rex "(?:\\\"isProduction\\\\\\\" : )(?&amp;lt;Prod&amp;gt;[^,]+)" 
| rex "(?:\\\"serialNumber\\\\\\\" : \\\\\\\")(?&amp;lt;ScannerSerialNum&amp;gt;[^\\\\]+)" 
| rex "(?:\\\"OSVersion\\\\\\\" : \\\\\\\")(?&amp;lt;ScannerOSVersion&amp;gt;[^\\\\]+)" 
| rex "(?:\\\"model\\\\\\\" : \\\\\\\")(?&amp;lt;ScannerModel&amp;gt;[^\\\\]+)" 
| rex "(?:\\\"Serial\\\\\\\" : \\\\\\\")(?&amp;lt;iPadSerial&amp;gt;[^\\\\]+)" 
| rex "(?:\\\"battery\\\\\\\" : \\\\\\\")(?&amp;lt;iPadBattery&amp;gt;[^\\\\]+)" 
| rex "(?:\\\"osVersion\\\\\\\" : \\\\\\\")(?&amp;lt;iPadOSVersion&amp;gt;[^\\\\]+)"
&lt;/CODE&gt;&lt;/PRE&gt;</description>
      <pubDate>Tue, 22 Jan 2019 17:06:32 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Regex-Help-exceeded-configured-match-limit/m-p/421130#M120989</guid>
      <dc:creator>JoshuaJohn</dc:creator>
      <dc:date>2019-01-22T17:06:32Z</dc:date>
    </item>
    <item>
      <title>Re: Regex Help; exceeded configured match_limit</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Regex-Help-exceeded-configured-match-limit/m-p/421131#M120990</link>
      <description>&lt;P&gt;Have you tried piping your events through &lt;CODE&gt;| kv&lt;/CODE&gt; or &lt;CODE&gt;| spath&lt;/CODE&gt;?  You will be surprised at how much gets done well enough!&lt;/P&gt;</description>
      <pubDate>Tue, 22 Jan 2019 23:04:47 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Regex-Help-exceeded-configured-match-limit/m-p/421131#M120990</guid>
      <dc:creator>woodcock</dc:creator>
      <dc:date>2019-01-22T23:04:47Z</dc:date>
    </item>
    <item>
      <title>Re: Regex Help; exceeded configured match_limit</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Regex-Help-exceeded-configured-match-limit/m-p/421132#M120991</link>
      <description>&lt;P&gt;I haven't, but I will look into it. Looks promising especially for my data.&lt;/P&gt;</description>
      <pubDate>Wed, 23 Jan 2019 15:23:55 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Regex-Help-exceeded-configured-match-limit/m-p/421132#M120991</guid>
      <dc:creator>JoshuaJohn</dc:creator>
      <dc:date>2019-01-23T15:23:55Z</dc:date>
    </item>
  </channel>
</rss>

