<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Extracting using rex in Splunk Search</title>
    <link>https://community.splunk.com/t5/Splunk-Search/Extracting-using-rex/m-p/513467#M144071</link>
    <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/223860"&gt;@rkris&lt;/a&gt;&amp;nbsp;, use the below query to get all three&amp;nbsp;&lt;SPAN&gt;"Possible NewApt.Worm - gadget.exe",&amp;nbsp; "Possible Y2K Zelu Trojan", and "Possible NewApt.Worm - baby.exe" from the logs.&lt;/SPAN&gt;&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;source="General-linux-sql.log" sourcetype="Linux" ("Possible NewApt.Worm - gadget.exe" OR "Possible Y2K Zelu Trojan" OR "Possible NewApt.Worm - baby.exe")&lt;/LI-CODE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Tue, 11 Aug 2020 00:10:23 GMT</pubDate>
    <dc:creator>impurush</dc:creator>
    <dc:date>2020-08-11T00:10:23Z</dc:date>
    <item>
      <title>Extracting using rex</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Extracting-using-rex/m-p/513439#M144056</link>
      <description>&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="splunk_qns8_p1.PNG" style="width: 492px;"&gt;&lt;img src="https://community.splunk.com/t5/image/serverpage/image-id/10183i93230AD5B5B4175B/image-dimensions/492x16?v=v2" width="492" height="16" role="button" title="splunk_qns8_p1.PNG" alt="splunk_qns8_p1.PNG" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="splunk_qns8_p2.PNG" style="width: 486px;"&gt;&lt;img src="https://community.splunk.com/t5/image/serverpage/image-id/10184i974E981B9C095413/image-dimensions/486x17?v=v2" width="486" height="17" role="button" title="splunk_qns8_p2.PNG" alt="splunk_qns8_p2.PNG" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="splunk_qns8_p3.PNG" style="width: 492px;"&gt;&lt;img src="https://community.splunk.com/t5/image/serverpage/image-id/10185i70973F00986A852E/image-dimensions/492x16?v=v2" width="492" height="16" role="button" title="splunk_qns8_p3.PNG" alt="splunk_qns8_p3.PNG" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;How do I use rex to extract the virus info so that I can display this info in my splunk dashboard?&lt;/P&gt;</description>
      <pubDate>Mon, 10 Aug 2020 20:37:52 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Extracting-using-rex/m-p/513439#M144056</guid>
      <dc:creator>rkris</dc:creator>
      <dc:date>2020-08-10T20:37:52Z</dc:date>
    </item>
    <item>
      <title>Re: Extracting using rex</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Extracting-using-rex/m-p/513443#M144058</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;Do you want to get that "Virus" word in a separate field using rex command&lt;BR /&gt;or do you want to show the log details in the dashboard which has a virus word?&lt;/P&gt;</description>
      <pubDate>Mon, 10 Aug 2020 20:44:18 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Extracting-using-rex/m-p/513443#M144058</guid>
      <dc:creator>impurush</dc:creator>
      <dc:date>2020-08-10T20:44:18Z</dc:date>
    </item>
    <item>
      <title>Re: Extracting using rex</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Extracting-using-rex/m-p/513445#M144059</link>
      <description>&lt;P&gt;Hi&lt;/P&gt;&lt;P&gt;getting the end of line after VIRUS - try the next&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;LI-CODE lang="java"&gt;index=&amp;lt;YOUR INDEX HERE&amp;gt; source="General-linux-sql.log" sourcetype="Linux" Virus
| rex "\s+VIRUS\s+-\s+(?&amp;lt;virusDescription&amp;gt;.*)"
| table _time virusDescription&lt;/LI-CODE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;r. Ismo&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 11 Aug 2020 05:42:27 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Extracting-using-rex/m-p/513445#M144059</guid>
      <dc:creator>isoutamo</dc:creator>
      <dc:date>2020-08-11T05:42:27Z</dc:date>
    </item>
    <item>
      <title>Re: Extracting using rex</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Extracting-using-rex/m-p/513457#M144066</link>
      <description>&lt;P&gt;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/44228"&gt;@impurush&lt;/a&gt;&amp;nbsp; Hi. I just want to get "Possible NewApt.Worm - gadget.exe",&amp;nbsp; "Possible Y2K Zelu Trojan", and "Possible NewApt.Worm - baby.exe"&lt;/P&gt;</description>
      <pubDate>Mon, 10 Aug 2020 22:27:27 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Extracting-using-rex/m-p/513457#M144066</guid>
      <dc:creator>rkris</dc:creator>
      <dc:date>2020-08-10T22:27:27Z</dc:date>
    </item>
    <item>
      <title>Re: Extracting using rex</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Extracting-using-rex/m-p/513461#M144068</link>
      <description>&lt;P&gt;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/214410"&gt;@isoutamo&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I need to put the following line first as this is where i'll be retrieving my info from&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="splunk_qns9_p1.PNG" style="width: 394px;"&gt;&lt;img src="https://community.splunk.com/t5/image/serverpage/image-id/10188iC81E48B2AB482BCF/image-dimensions/394x66?v=v2" width="394" height="66" role="button" title="splunk_qns9_p1.PNG" alt="splunk_qns9_p1.PNG" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;So do i add your code after this line?&lt;/P&gt;</description>
      <pubDate>Mon, 10 Aug 2020 22:36:19 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Extracting-using-rex/m-p/513461#M144068</guid>
      <dc:creator>rkris</dc:creator>
      <dc:date>2020-08-10T22:36:19Z</dc:date>
    </item>
    <item>
      <title>Re: Extracting using rex</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Extracting-using-rex/m-p/513467#M144071</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/223860"&gt;@rkris&lt;/a&gt;&amp;nbsp;, use the below query to get all three&amp;nbsp;&lt;SPAN&gt;"Possible NewApt.Worm - gadget.exe",&amp;nbsp; "Possible Y2K Zelu Trojan", and "Possible NewApt.Worm - baby.exe" from the logs.&lt;/SPAN&gt;&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;source="General-linux-sql.log" sourcetype="Linux" ("Possible NewApt.Worm - gadget.exe" OR "Possible Y2K Zelu Trojan" OR "Possible NewApt.Worm - baby.exe")&lt;/LI-CODE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 11 Aug 2020 00:10:23 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Extracting-using-rex/m-p/513467#M144071</guid>
      <dc:creator>impurush</dc:creator>
      <dc:date>2020-08-11T00:10:23Z</dc:date>
    </item>
    <item>
      <title>Re: Extracting using rex</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Extracting-using-rex/m-p/513485#M144075</link>
      <description>&lt;P&gt;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/44228"&gt;@impurush&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Is there a way for me to group them all into a table?&lt;/P&gt;</description>
      <pubDate>Tue, 11 Aug 2020 02:36:00 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Extracting-using-rex/m-p/513485#M144075</guid>
      <dc:creator>rkris</dc:creator>
      <dc:date>2020-08-11T02:36:00Z</dc:date>
    </item>
    <item>
      <title>Re: Extracting using rex</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Extracting-using-rex/m-p/513486#M144076</link>
      <description>&lt;P&gt;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/223860"&gt;@rkris&lt;/a&gt;&amp;nbsp;, you can try this&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;source="General-linux-sql.log" sourcetype="Linux" ("Possible NewApt.Worm - gadget.exe" OR "Possible Y2K Zelu Trojan" OR "Possible NewApt.Worm - baby.exe")
|rex field=_raw "Virus\s-\s(?&amp;lt;virus_name&amp;gt;.*)"
| table _time,virus_name&lt;/LI-CODE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 11 Aug 2020 02:59:27 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Extracting-using-rex/m-p/513486#M144076</guid>
      <dc:creator>impurush</dc:creator>
      <dc:date>2020-08-11T02:59:27Z</dc:date>
    </item>
    <item>
      <title>Re: Extracting using rex</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Extracting-using-rex/m-p/513501#M144077</link>
      <description>&lt;P&gt;Yes add it to after those. You should always add at least&lt;/P&gt;&lt;P&gt;index=&amp;lt;your index&amp;gt; sourcetype=&amp;lt;your sourcetype&amp;gt; source=&amp;lt;your source&amp;gt; when you are looking events. And in this case add also word “Virus” as it would be on your each event.&amp;nbsp;&lt;BR /&gt;That way your query is more powerful, quicker and use less resources.&lt;/P&gt;&lt;P&gt;I updated my previous example to contain these.&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;r. &amp;nbsp;Ismo&lt;/P&gt;</description>
      <pubDate>Tue, 11 Aug 2020 05:43:16 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Extracting-using-rex/m-p/513501#M144077</guid>
      <dc:creator>isoutamo</dc:creator>
      <dc:date>2020-08-11T05:43:16Z</dc:date>
    </item>
  </channel>
</rss>

