<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: How to extract the fields for kv pair syslog data? in Splunk Search</title>
    <link>https://community.splunk.com/t5/Splunk-Search/How-to-extract-the-fields-for-kv-pair-syslog-data/m-p/431457#M123329</link>
    <description>&lt;P&gt;Hi @knalla, &lt;/P&gt;

&lt;P&gt;this regular expression should work &lt;/P&gt;

&lt;P&gt;&lt;CODE&gt;^(?:[^\s]+\s*:){5}|([^:]+):\s*([^,]+)[,$]*&lt;/CODE&gt;&lt;BR /&gt;
&lt;A href="https://regex101.com/r/0lWcR3/1"&gt;https://regex101.com/r/0lWcR3/1&lt;/A&gt;&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;props.conf

[yoursourcetype]
TRANSFORMS-yourfirstextraction = extractexample



transforms.conf

[extractexample]
REGEX=^(?:[^\s]+\s*:){5}|([^:]+):\s*([^,]+)[,$]*
FORMAT = $1::$2
MV_ADD = true
&lt;/CODE&gt;&lt;/PRE&gt;</description>
    <pubDate>Mon, 27 Aug 2018 15:25:20 GMT</pubDate>
    <dc:creator>horsefez</dc:creator>
    <dc:date>2018-08-27T15:25:20Z</dc:date>
    <item>
      <title>How to extract the fields for kv pair syslog data?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-extract-the-fields-for-kv-pair-syslog-data/m-p/431456#M123328</link>
      <description>&lt;P&gt;Hi All,&lt;/P&gt;

&lt;P&gt;How to extract the fields for the syslog data with kv values at indexing time?&lt;/P&gt;

&lt;P&gt;&lt;CODE&gt;Aug 27 10:05:58 ciscoasa SFIMS: Protocol: TCP, SrcIP: 1.2.3.1, OriginalClientIP: ::, DstIP: 11.22.33.44, SrcPort: 50981, DstPort: 443, TCPFlags: 0x0, IngressZone: N_inside, EgressZone: N_outside, DE: Primary Detection Engine (ccc24074-6d7e-11e7-9213-b429232f86cc), Policy:allowed_new, ConnectType: Start, AccessControlRuleName: Allow port 80 443, AccessControlRuleAction: Allow, Prefilter Policy: WE_Prefilter, UserName: No Authentication Required, Client: SSL client, ApplicationProtocol: HTTPS, WebApplication: Windows, InitiatorPackets: 3, ResponderPackets: 1, InitiatorBytes: 436, ResponderBytes: 66, Policy: Balanced Security and Connectivity, DNSResponseType: No Error, Sinkhole: Unknown, URLCategory: Business and Economy, URLReputation: Well known, URL: splunk.com&lt;/CODE&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 27 Aug 2018 15:13:32 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-extract-the-fields-for-kv-pair-syslog-data/m-p/431456#M123328</guid>
      <dc:creator>knalla</dc:creator>
      <dc:date>2018-08-27T15:13:32Z</dc:date>
    </item>
    <item>
      <title>Re: How to extract the fields for kv pair syslog data?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-extract-the-fields-for-kv-pair-syslog-data/m-p/431457#M123329</link>
      <description>&lt;P&gt;Hi @knalla, &lt;/P&gt;

&lt;P&gt;this regular expression should work &lt;/P&gt;

&lt;P&gt;&lt;CODE&gt;^(?:[^\s]+\s*:){5}|([^:]+):\s*([^,]+)[,$]*&lt;/CODE&gt;&lt;BR /&gt;
&lt;A href="https://regex101.com/r/0lWcR3/1"&gt;https://regex101.com/r/0lWcR3/1&lt;/A&gt;&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;props.conf

[yoursourcetype]
TRANSFORMS-yourfirstextraction = extractexample



transforms.conf

[extractexample]
REGEX=^(?:[^\s]+\s*:){5}|([^:]+):\s*([^,]+)[,$]*
FORMAT = $1::$2
MV_ADD = true
&lt;/CODE&gt;&lt;/PRE&gt;</description>
      <pubDate>Mon, 27 Aug 2018 15:25:20 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-extract-the-fields-for-kv-pair-syslog-data/m-p/431457#M123329</guid>
      <dc:creator>horsefez</dc:creator>
      <dc:date>2018-08-27T15:25:20Z</dc:date>
    </item>
  </channel>
</rss>

