<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Field Extraction help in Splunk Search</title>
    <link>https://community.splunk.com/t5/Splunk-Search/Field-Extraction-help/m-p/475482#M133631</link>
    <description>&lt;P&gt;@woodcock 's solution is better. I modified my answer.&lt;BR /&gt;
To extract fields, try my REGEX OR &lt;CODE&gt;Unsuccessful login|Successful log in&lt;/CODE&gt; , simply.&lt;/P&gt;</description>
    <pubDate>Sun, 23 Feb 2020 21:58:21 GMT</pubDate>
    <dc:creator>to4kawa</dc:creator>
    <dc:date>2020-02-23T21:58:21Z</dc:date>
    <item>
      <title>Field Extraction help</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Field-Extraction-help/m-p/475479#M133628</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;

&lt;P&gt;I have events in the following format. It would either be a "Successful log in" or a "Unsuccessful login". I'm trying to do a CIM Mapping under Authentication Data Model and need the values to show up as either success or failure to map correctly. But struggling a bit with this.&lt;/P&gt;

&lt;P&gt;1|Sun, 23 Feb 2020 22:31:10 +1000|INFO||||||user "ABCD" (1): &lt;STRONG&gt;Successful log in&lt;/STRONG&gt;. (API Connection)&lt;/P&gt;

&lt;P&gt;Thanks,&lt;BR /&gt;
AKN&lt;/P&gt;</description>
      <pubDate>Sun, 23 Feb 2020 12:44:31 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Field-Extraction-help/m-p/475479#M133628</guid>
      <dc:creator>aknsun</dc:creator>
      <dc:date>2020-02-23T12:44:31Z</dc:date>
    </item>
    <item>
      <title>Re: Field Extraction help</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Field-Extraction-help/m-p/475480#M133629</link>
      <description>&lt;PRE&gt;&lt;CODE&gt;| makeresults 
| eval _raw="1|Sun, 23 Feb 2020 22:31:10 +1000|INFO||||||user \"ABCD\" (1): Successful log in. (API Connection)#1|Sun, 23 Feb 2020 22:32:10 +1000|INFO||||||user \"BCDE\" (1): Unsuccessful login. (API Connection)" 
| makemv delim="#" _raw 
| stats count by _raw
| rex "(?i)^.*\s(?&amp;lt;vendor_action&amp;gt;.*?successful.+in)"
&lt;/CODE&gt;&lt;/PRE&gt;</description>
      <pubDate>Sun, 23 Feb 2020 13:16:07 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Field-Extraction-help/m-p/475480#M133629</guid>
      <dc:creator>to4kawa</dc:creator>
      <dc:date>2020-02-23T13:16:07Z</dc:date>
    </item>
    <item>
      <title>Re: Field Extraction help</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Field-Extraction-help/m-p/475481#M133630</link>
      <description>&lt;P&gt;First you write a &lt;CODE&gt;field extraction&lt;/CODE&gt; for this &lt;CODE&gt;sourcetype&lt;/CODE&gt; to create a field called something like &lt;CODE&gt;vendor_action&lt;/CODE&gt; which captures either &lt;CODE&gt;Successful log in&lt;/CODE&gt; or &lt;CODE&gt;Unsuccessful login&lt;/CODE&gt; strings.  Then you create a &lt;CODE&gt;lookup file&lt;/CODE&gt; like this:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;vendor_action, action
Successful log in, success
Unsuccessful login, failure
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;Then you create an &lt;CODE&gt;automatic lookup&lt;/CODE&gt; for this &lt;CODE&gt;sourcetype&lt;/CODE&gt; to create the &lt;CODE&gt;action&lt;/CODE&gt; field from the &lt;CODE&gt;vendor_action&lt;/CODE&gt; field.&lt;BR /&gt;
Done.&lt;/P&gt;</description>
      <pubDate>Sun, 23 Feb 2020 15:09:59 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Field-Extraction-help/m-p/475481#M133630</guid>
      <dc:creator>woodcock</dc:creator>
      <dc:date>2020-02-23T15:09:59Z</dc:date>
    </item>
    <item>
      <title>Re: Field Extraction help</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Field-Extraction-help/m-p/475482#M133631</link>
      <description>&lt;P&gt;@woodcock 's solution is better. I modified my answer.&lt;BR /&gt;
To extract fields, try my REGEX OR &lt;CODE&gt;Unsuccessful login|Successful log in&lt;/CODE&gt; , simply.&lt;/P&gt;</description>
      <pubDate>Sun, 23 Feb 2020 21:58:21 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Field-Extraction-help/m-p/475482#M133631</guid>
      <dc:creator>to4kawa</dc:creator>
      <dc:date>2020-02-23T21:58:21Z</dc:date>
    </item>
    <item>
      <title>Re: Field Extraction help</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Field-Extraction-help/m-p/475483#M133632</link>
      <description>&lt;P&gt;@woodcock Thanks for the easiest of solutions. I had created the field extraction ealier. However, instead of automatic lookup method you suggested, I went on a winding path. lol&lt;/P&gt;

&lt;P&gt;Thanks for the suggestion and it's working perfectly fine now.&lt;/P&gt;

&lt;P&gt;Thanks,&lt;BR /&gt;
AKN&lt;/P&gt;</description>
      <pubDate>Mon, 24 Feb 2020 05:08:28 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Field-Extraction-help/m-p/475483#M133632</guid>
      <dc:creator>aknsun</dc:creator>
      <dc:date>2020-02-24T05:08:28Z</dc:date>
    </item>
    <item>
      <title>Re: Field Extraction help</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Field-Extraction-help/m-p/475484#M133633</link>
      <description>&lt;P&gt;In Splunk, the answer always looks so simple once you see it.&lt;/P&gt;</description>
      <pubDate>Mon, 24 Feb 2020 14:18:17 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Field-Extraction-help/m-p/475484#M133633</guid>
      <dc:creator>woodcock</dc:creator>
      <dc:date>2020-02-24T14:18:17Z</dc:date>
    </item>
  </channel>
</rss>

