<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Use field extractor with a search? in Splunk Search</title>
    <link>https://community.splunk.com/t5/Splunk-Search/Use-field-extractor-with-a-search/m-p/449832#M127364</link>
    <description>&lt;P&gt;Hello,&lt;/P&gt;

&lt;P&gt;I am wandering to know if there is a way to apply a field extractor not to a source type but to a search. &lt;BR /&gt;
I’d like to employ a delimited-based field extraction only for specific condition. Like &lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;Sourcetype=xxx fied_1=abcd
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;Thanks for the help.&lt;/P&gt;

&lt;P&gt;Regards,&lt;BR /&gt;
Alex.&lt;/P&gt;</description>
    <pubDate>Tue, 30 Oct 2018 15:36:00 GMT</pubDate>
    <dc:creator>AlexeySh</dc:creator>
    <dc:date>2018-10-30T15:36:00Z</dc:date>
    <item>
      <title>Use field extractor with a search?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Use-field-extractor-with-a-search/m-p/449832#M127364</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;

&lt;P&gt;I am wandering to know if there is a way to apply a field extractor not to a source type but to a search. &lt;BR /&gt;
I’d like to employ a delimited-based field extraction only for specific condition. Like &lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;Sourcetype=xxx fied_1=abcd
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;Thanks for the help.&lt;/P&gt;

&lt;P&gt;Regards,&lt;BR /&gt;
Alex.&lt;/P&gt;</description>
      <pubDate>Tue, 30 Oct 2018 15:36:00 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Use-field-extractor-with-a-search/m-p/449832#M127364</guid>
      <dc:creator>AlexeySh</dc:creator>
      <dc:date>2018-10-30T15:36:00Z</dc:date>
    </item>
    <item>
      <title>Re: Use field extractor with a search?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Use-field-extractor-with-a-search/m-p/449833#M127365</link>
      <description>&lt;P&gt;@AlexeySh&lt;/P&gt;

&lt;P&gt;Can you please share more information like sample events and expected results??&lt;/P&gt;</description>
      <pubDate>Tue, 30 Oct 2018 15:41:21 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Use-field-extractor-with-a-search/m-p/449833#M127365</guid>
      <dc:creator>kamlesh_vaghela</dc:creator>
      <dc:date>2018-10-30T15:41:21Z</dc:date>
    </item>
    <item>
      <title>Re: Use field extractor with a search?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Use-field-extractor-with-a-search/m-p/449834#M127366</link>
      <description>&lt;P&gt;Well, basically it’s a Paloalto Traps logs. You can find its log format on Paloalto &lt;A href="https://www.paloaltonetworks.com/documentation/traps/tms/traps-management-service-admin/view-and-manage-logs/forward-traps-logs-to-a-syslog-server/traps-logs-format-syslog-export-logging-service#id186DMF00GKF_id186EA0C10E5"&gt;website&lt;/A&gt;. As you can see there are 4 log types and they are slightly different, 1-2 fields more or 1-2 fields  less. So you can’t apply field extraction to sourcetype directly, you have to know logs format as well (‘recordType’, the first field).&lt;/P&gt;

&lt;P&gt;Unfortunately our Traps logs come to Splunk in a pretty messy format: we have some additional information in the beginning of each event. So we decided to create an independent index and sourcetype for it. By using rex transformation we can extract a “real” value of ‘recordType’ field. But once we have it, we’d like to just use a delimited-based field extraction by comma to extract all other fields for each log type.&lt;/P&gt;</description>
      <pubDate>Tue, 30 Oct 2018 17:52:35 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Use-field-extractor-with-a-search/m-p/449834#M127366</guid>
      <dc:creator>AlexeySh</dc:creator>
      <dc:date>2018-10-30T17:52:35Z</dc:date>
    </item>
    <item>
      <title>Re: Use field extractor with a search?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Use-field-extractor-with-a-search/m-p/449835#M127367</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;

&lt;P&gt;you can use 'rex' command with your query to extract fields at search time and provides fields extraction as well. The only limitation is, it does not provide any delimiter based extraction, you have to write the regex.&lt;/P&gt;

&lt;P&gt;rex command reference - &lt;A href="https://docs.splunk.com/Documentation/Splunk/7.2.0/SearchReference/Rex"&gt;https://docs.splunk.com/Documentation/Splunk/7.2.0/SearchReference/Rex&lt;/A&gt;&lt;/P&gt;

&lt;P&gt;Please accept the answer, it it solves your problem.&lt;/P&gt;</description>
      <pubDate>Thu, 01 Nov 2018 10:19:33 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Use-field-extractor-with-a-search/m-p/449835#M127367</guid>
      <dc:creator>gaurav_maniar</dc:creator>
      <dc:date>2018-11-01T10:19:33Z</dc:date>
    </item>
    <item>
      <title>Re: Use field extractor with a search?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Use-field-extractor-with-a-search/m-p/449836#M127368</link>
      <description>&lt;P&gt;Hello @gaurav_maniar,&lt;/P&gt;

&lt;P&gt;If we want to extract all fields, the rex command became too complicated and doesn’t work properly (or it could be our lack of skills as well). That’s why we want to use delimited-based field extraction.&lt;/P&gt;</description>
      <pubDate>Fri, 02 Nov 2018 09:38:24 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Use-field-extractor-with-a-search/m-p/449836#M127368</guid>
      <dc:creator>AlexeySh</dc:creator>
      <dc:date>2018-11-02T09:38:24Z</dc:date>
    </item>
    <item>
      <title>Re: Use field extractor with a search?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Use-field-extractor-with-a-search/m-p/449837#M127369</link>
      <description>&lt;P&gt;As your data is already delimited, writing a field extraction with rex command will be very easy and it will work properly if your regex is correct without any problem.&lt;/P&gt;

&lt;P&gt;If you go with filed extractor, it will directly apply it to sourcetype and as of now no delimited field extraction is available with rex command.&lt;/P&gt;

&lt;P&gt;We can help, if you provide some sample logs&lt;/P&gt;</description>
      <pubDate>Fri, 02 Nov 2018 11:51:07 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Use-field-extractor-with-a-search/m-p/449837#M127369</guid>
      <dc:creator>gaurav_maniar</dc:creator>
      <dc:date>2018-11-02T11:51:07Z</dc:date>
    </item>
    <item>
      <title>Re: Use field extractor with a search?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Use-field-extractor-with-a-search/m-p/449838#M127370</link>
      <description>&lt;P&gt;We will really appreciate the help.&lt;/P&gt;

&lt;P&gt;Here’s some simple logs, I just modified some private information, like customer ID or domain name.&lt;/P&gt;

&lt;P&gt;Nov  2 12:50:14 sc-1456400473-logforwardercomp-5bce225a53cefb004074a882-59fm5sn logforwarder[24] analytics,agent_data,,AgentTimelineEvent,hash,2018-11-02T12:49:45.267329700Z,2018-11-02T12:50:08.656Z,2018-11-02T12:49:45.267329700Z,60,,TrapsAgent,1111111173,6857076101111111111,coreop-f-prodb2-mnmauto123123123123-1234.prod.brz,2.0.6,70,1,6aaaaaaaaaaaa5da86ada7b4c6b01504,1,0,6.1.7601,1,123.123.123.123,wks123,abcdef.fr,,,5.0.3.38921,36-4887,0,7777777777aaaaaaaaaa157092d94eb18c2a73a0a49beeaaaaaaaaaaa30e86a2,dll,,2018-11-02T12:49:45.267329700Z,comdlg32.dll,\?\C:\Windows\SysWOW64\,485888,"{""contentVersion"":""36-4887"",""result"":""Benign"",""trusted"":""None"",""publishers"":[""Microsoft Windows""],""resultId"":0,""trustedId"":0}",0,0,16159&lt;/P&gt;

&lt;HR /&gt;

&lt;P&gt;Nov  2 08:59:06 sc-1456400473-logforwardercomp-5bce225a53cefb004074a882-59fm5sn logforwarder[24] threat,threat,,AgentSecurityEvent,2018-11-02T08:16:15.144216600Z,2018-11-02T08:58:55.998Z,2018-11-02T08:16:15.144216600Z,60,,TrapsAgent,1111111173,6857076101111111111,coreop-f-prodb2-mnmauto123123123123-1234.prod.brz,2.0.6,70,1,6aaaaaaaaaaaa5da86ada7b4c6b01504,1,0,6.1.7601,1,123.123.123.123,wks456,abcdef.fr,0,2,5.0.3.38921,36-4887,0,a1866535ef474c2f869865f09x111111,COMPONENT_EPM_J01,ExploitModules,CYSTATUS_JIT_EXCEPTION,,reported,0,,,0,0,"[""CreateProcessA"",""2""]",0,-1,0,"[{""pid"":6952,""parentId"":2724,""exeFileIdx"":0,""userIdx"":0,""commandLine"":""\""C:\Users\user_1234\AppData\Abcdabcd\aaaaaaaaaaaaaa\firefox.exe\"" ""}]","[{""rawFullPath"":""C:\Users\user_1234\AppData\Abcdabcd\aaaaaaaaaaaaaa\firefox.exe"",""fileName"":""firefox.exe"",""sha256"":""70225F14A28007815B0410B1F41F7EA6A16B6329FD69F7EC0638A1A1A1A1A1A1"",""fileSize"":531408,""signers"":[""Mozilla Corporation""]}]","[{""userName"":""user_1234"",""userDomain"":""abcdef.fr""}]",[],Memory Corruption Exploit&lt;/P&gt;

&lt;HR /&gt;

&lt;P&gt;The log’s format is described on Paloalto &lt;A href="https://www.paloaltonetworks.com/documentation/traps/tms/traps-management-service-admin/view-and-manage-logs/forward-traps-logs-to-a-syslog-server/traps-logs-format-syslog-export-logging-service#id186DMF00GKF_id186EA0C10E5" target="_blank"&gt;website&lt;/A&gt;.&lt;/P&gt;

&lt;P&gt;Thanks for the help!&lt;/P&gt;</description>
      <pubDate>Tue, 29 Sep 2020 21:53:04 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Use-field-extractor-with-a-search/m-p/449838#M127370</guid>
      <dc:creator>AlexeySh</dc:creator>
      <dc:date>2020-09-29T21:53:04Z</dc:date>
    </item>
  </channel>
</rss>

