<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Odd Data Extraction via Rex in Splunk Search</title>
    <link>https://community.splunk.com/t5/Splunk-Search/Odd-Data-Extraction-via-Rex/m-p/472234#M132856</link>
    <description>&lt;P&gt;It doesn't look like it.  Besides, that just organizes it by the log itself and I want to see it in a timechart format to extract data by the day rather than totaling it all by each log.&lt;/P&gt;</description>
    <pubDate>Mon, 23 Dec 2019 20:25:30 GMT</pubDate>
    <dc:creator>harshparikhxlrd</dc:creator>
    <dc:date>2019-12-23T20:25:30Z</dc:date>
    <item>
      <title>Odd Data Extraction via Rex</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Odd-Data-Extraction-via-Rex/m-p/472232#M132854</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;

&lt;P&gt;I am trying to extract data for this log.  I have the data logged into the search.  What's odd is when I attempt to extract it, it only covers up to the Date of the 19th.  The code:&lt;/P&gt;</description>
      <pubDate>Mon, 23 Dec 2019 19:58:58 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Odd-Data-Extraction-via-Rex/m-p/472232#M132854</guid>
      <dc:creator>harshparikhxlrd</dc:creator>
      <dc:date>2019-12-23T19:58:58Z</dc:date>
    </item>
    <item>
      <title>Re: Odd Data Extraction via Rex</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Odd-Data-Extraction-via-Rex/m-p/472233#M132855</link>
      <description>&lt;P&gt;If you replace line 5 with "|stats count by log" and eliminate the rest of the SPL, do you get a count for both logs?&lt;/P&gt;</description>
      <pubDate>Mon, 23 Dec 2019 20:17:23 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Odd-Data-Extraction-via-Rex/m-p/472233#M132855</guid>
      <dc:creator>mydog8it</dc:creator>
      <dc:date>2019-12-23T20:17:23Z</dc:date>
    </item>
    <item>
      <title>Re: Odd Data Extraction via Rex</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Odd-Data-Extraction-via-Rex/m-p/472234#M132856</link>
      <description>&lt;P&gt;It doesn't look like it.  Besides, that just organizes it by the log itself and I want to see it in a timechart format to extract data by the day rather than totaling it all by each log.&lt;/P&gt;</description>
      <pubDate>Mon, 23 Dec 2019 20:25:30 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Odd-Data-Extraction-via-Rex/m-p/472234#M132856</guid>
      <dc:creator>harshparikhxlrd</dc:creator>
      <dc:date>2019-12-23T20:25:30Z</dc:date>
    </item>
    <item>
      <title>Re: Odd Data Extraction via Rex</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Odd-Data-Extraction-via-Rex/m-p/472235#M132857</link>
      <description>&lt;P&gt;Please share some sample events you're trying to parse.&lt;/P&gt;</description>
      <pubDate>Mon, 23 Dec 2019 21:00:00 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Odd-Data-Extraction-via-Rex/m-p/472235#M132857</guid>
      <dc:creator>richgalloway</dc:creator>
      <dc:date>2019-12-23T21:00:00Z</dc:date>
    </item>
    <item>
      <title>Re: Odd Data Extraction via Rex</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Odd-Data-Extraction-via-Rex/m-p/472236#M132858</link>
      <description>&lt;P&gt;Field names are case sensitive. Being able to perform a "count by x" type search and seeing two diferent filed names (in your case - ResetMyCallLog and ResetMycallLog) indicates there are two different configurations for the data. So the timing of the events that you are seeing in the search results could be tied to when the configuration change occurred. Once the log naming issue is addressed the data can be seen as you desire without SPL heroics to fix the data issue.&lt;/P&gt;

&lt;P&gt;In the mean time, you can try this:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt; index=monitoring sourcetype=PEGA:WinEventLog:Application (SourceName="RoboticLogging" OR SourceName="Application") (Type= "Information") ("TaskID=\"Logs\"") ("Department="CCC Sales"")
 | rex field=_raw "Automation=\"(?&amp;lt;Auto&amp;gt;.+?)\"" 
 | where Auto = "DA_E_SMDLogTime" OR Auto = "DA_E_AuditLog" OR Auto = "DA_E_AfterCallAuditLog"  
 | rex  "Message=\"(?&amp;lt;log&amp;gt;.+?)\"" 
 | timechart count by log 
 | rename AppsLog as "Start My Day", CalltrackerLog as "Sales Tracker", QMLog as "Queue Manager"
 | eval "Reset My Call" = coalesce(ResetMycallLog, ResetMyCallLog)
 | eval Time = strftime(_time, "%d %b") 
 | fields - _time 
 | table Time "Start My Day", "Sales Tracker", "Queue Manager", "Reset My Call"
&lt;/CODE&gt;&lt;/PRE&gt;</description>
      <pubDate>Mon, 23 Dec 2019 21:08:17 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Odd-Data-Extraction-via-Rex/m-p/472236#M132858</guid>
      <dc:creator>mydog8it</dc:creator>
      <dc:date>2019-12-23T21:08:17Z</dc:date>
    </item>
    <item>
      <title>Re: Odd Data Extraction via Rex</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Odd-Data-Extraction-via-Rex/m-p/472237#M132859</link>
      <description>&lt;P&gt;you might need to move the coalesce above the count statement, try this instead:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt; index=monitoring sourcetype=PEGA:WinEventLog:Application (SourceName="RoboticLogging" OR SourceName="Application") (Type= "Information") ("TaskID=\"Logs\"") ("Department="CCC Sales"")
 | rex field=_raw "Automation=\"(?&amp;lt;Auto&amp;gt;.+?)\"" 
 | where Auto = "DA_E_SMDLogTime" OR Auto = "DA_E_AuditLog" OR Auto = "DA_E_AfterCallAuditLog"  
 | rex  "Message=\"(?&amp;lt;log&amp;gt;.+?)\"" 
 | eval "Reset My Call" = coalesce(ResetMycallLog, ResetMyCallLog)
 | timechart count by log 
 | rename AppsLog as "Start My Day", CalltrackerLog as "Sales Tracker", QMLog as "Queue Manager"
 | eval Time = strftime(_time, "%d %b") 
 | fields - _time 
 | table Time "Start My Day", "Sales Tracker", "Queue Manager", "Reset My Call"
&lt;/CODE&gt;&lt;/PRE&gt;</description>
      <pubDate>Mon, 23 Dec 2019 21:21:42 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Odd-Data-Extraction-via-Rex/m-p/472237#M132859</guid>
      <dc:creator>mydog8it</dc:creator>
      <dc:date>2019-12-23T21:21:42Z</dc:date>
    </item>
    <item>
      <title>Re: Odd Data Extraction via Rex</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Odd-Data-Extraction-via-Rex/m-p/472238#M132860</link>
      <description>&lt;P&gt;So somebody changed the filename in there somewhere; try this:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;index="monitoring" AND sourcetype="PEGA:WinEventLog:Application" AND (SourceName="RoboticLogging" OR SourceName="Application") AND (Type= "Information") AND ("TaskID=\"Logs\"") AND ("Department="CCC Sales"")
| rex field=_raw "Automation=\"(?&amp;lt;Auto&amp;gt;.+?)\"" 
| where Auto = "DA_E_SMDLogTime" OR Auto = "DA_E_AuditLog" OR Auto = "DA_E_AfterCallAuditLog"  
| rex  "Message=\"(?&amp;lt;log&amp;gt;.+?)\"" 
| timechart count by log 
| rename AppsLog AS "Start My Day", CalltrackerLog AS "Sales Tracker", QMLog AS "Queue Manager"
| eval "Reset My Call" = coalesce(ResetMycallLog, ResetMyCallLog)
| fields - ResetMycallLog, ResetMyCallLog
| eval Time = strftime(_time, "%d %b") 
| fields - _time 
| table Time "Start My Day", "Sales Tracker", "Queue Manager", "Reset My Call"
&lt;/CODE&gt;&lt;/PRE&gt;</description>
      <pubDate>Mon, 23 Dec 2019 22:34:57 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Odd-Data-Extraction-via-Rex/m-p/472238#M132860</guid>
      <dc:creator>woodcock</dc:creator>
      <dc:date>2019-12-23T22:34:57Z</dc:date>
    </item>
  </channel>
</rss>

