<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Extraction using rex in Splunk Search</title>
    <link>https://community.splunk.com/t5/Splunk-Search/Extraction-using-rex/m-p/513739#M144173</link>
    <description>&lt;P&gt;This is a dashboard panel that i've created by extracting virus information from a log file&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Splunk_qns1.PNG" style="width: 854px;"&gt;&lt;img src="https://community.splunk.com/t5/image/serverpage/image-id/10217i5D6FAD757F1A0DD0/image-dimensions/854x153?v=v2" width="854" height="153" role="button" title="Splunk_qns1.PNG" alt="Splunk_qns1.PNG" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;This is my search query&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Splunk_qns2.PNG" style="width: 400px;"&gt;&lt;img src="https://community.splunk.com/t5/image/serverpage/image-id/10218i374E117CAF390C70/image-size/medium?v=v2&amp;amp;px=400" role="button" title="Splunk_qns2.PNG" alt="Splunk_qns2.PNG" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I actually want to see only the virus names and the IP addresses. So, it should look like this:&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Splunk_qns3.PNG" style="width: 400px;"&gt;&lt;img src="https://community.splunk.com/t5/image/serverpage/image-id/10220i1A64899904169E0F/image-size/medium?v=v2&amp;amp;px=400" role="button" title="Splunk_qns3.PNG" alt="Splunk_qns3.PNG" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;How would I change my regex to obtain this result?&lt;/P&gt;</description>
    <pubDate>Wed, 12 Aug 2020 15:50:16 GMT</pubDate>
    <dc:creator>rkris</dc:creator>
    <dc:date>2020-08-12T15:50:16Z</dc:date>
    <item>
      <title>Extraction using rex</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Extraction-using-rex/m-p/513739#M144173</link>
      <description>&lt;P&gt;This is a dashboard panel that i've created by extracting virus information from a log file&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Splunk_qns1.PNG" style="width: 854px;"&gt;&lt;img src="https://community.splunk.com/t5/image/serverpage/image-id/10217i5D6FAD757F1A0DD0/image-dimensions/854x153?v=v2" width="854" height="153" role="button" title="Splunk_qns1.PNG" alt="Splunk_qns1.PNG" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;This is my search query&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Splunk_qns2.PNG" style="width: 400px;"&gt;&lt;img src="https://community.splunk.com/t5/image/serverpage/image-id/10218i374E117CAF390C70/image-size/medium?v=v2&amp;amp;px=400" role="button" title="Splunk_qns2.PNG" alt="Splunk_qns2.PNG" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I actually want to see only the virus names and the IP addresses. So, it should look like this:&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Splunk_qns3.PNG" style="width: 400px;"&gt;&lt;img src="https://community.splunk.com/t5/image/serverpage/image-id/10220i1A64899904169E0F/image-size/medium?v=v2&amp;amp;px=400" role="button" title="Splunk_qns3.PNG" alt="Splunk_qns3.PNG" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;How would I change my regex to obtain this result?&lt;/P&gt;</description>
      <pubDate>Wed, 12 Aug 2020 15:50:16 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Extraction-using-rex/m-p/513739#M144173</guid>
      <dc:creator>rkris</dc:creator>
      <dc:date>2020-08-12T15:50:16Z</dc:date>
    </item>
    <item>
      <title>Re: Extraction using rex</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Extraction-using-rex/m-p/513771#M144189</link>
      <description>If you can share your sample data as text instead of a screen shot then we can test with it.</description>
      <pubDate>Wed, 12 Aug 2020 19:25:19 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Extraction-using-rex/m-p/513771#M144189</guid>
      <dc:creator>richgalloway</dc:creator>
      <dc:date>2020-08-12T19:25:19Z</dc:date>
    </item>
    <item>
      <title>Re: Extraction using rex</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Extraction-using-rex/m-p/513903#M144231</link>
      <description>&lt;P&gt;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/213957"&gt;@richgalloway&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;This is my sample data in text format:&lt;/P&gt;&lt;P&gt;Apr 23 14:13:35 [143.5.113.3] snort[1976]: [1:729:1]&amp;nbsp; Virus - &lt;FONT color="#FF0000"&gt;Possible scr Worm&lt;/FONT&gt; &amp;lt;\Device\Packet_{D3446BC6-343C-4C0C-8A29-AC6161C9D0F3}&amp;gt; &lt;FONT color="#FF0000"&gt;TCP 37.236.185.162:80&amp;nbsp; -&amp;gt; 10.10.50.218:100&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Apr 23 14:13:35 [143.5.113.3] snort[1976]: [1:779:1]&amp;nbsp; Virus - &lt;FONT color="#FF0000"&gt;Possible NewApt.Worm - gadget.exe&lt;/FONT&gt; &amp;lt;\Device\Packet_{D3446BC6-343C-4C0C-8A29-AC6161C9D0F3}&amp;gt; &lt;FONT color="#FF0000"&gt;TCP 161.38.138.124:80&amp;nbsp; -&amp;gt; 10.10.50.85:100&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Apr 23 14:13:35 [143.5.113.3] snort[1976]: [1:757:1]&amp;nbsp; Virus - &lt;FONT color="#FF0000"&gt;Possible Y2K Zelu Trojan&lt;/FONT&gt; &amp;lt;\Device\Packet_{D3446BC6-343C-4C0C-8A29-AC6161C9D0F3}&amp;gt; &lt;FONT color="#FF0000"&gt;TCP 187.226.150.129:80&amp;nbsp; -&amp;gt; 10.10.50.102:100&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Apr 23 14:13:35 [143.5.113.3] snort: [1:767:1]&amp;nbsp; Virus - &lt;FONT color="#FF0000"&gt;Possible NewApt.Worm - baby.exe&lt;/FONT&gt; [Classification: ] [Priority: ]: {PROTOCOL} &lt;FONT color="#FF0000"&gt;222.190.104.160:58287 -&amp;gt; 26.73.78.96:25&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Apr 23 14:13:35 [143.5.113.3] snort[1976]: [1:727:1]&amp;nbsp; Virus - &lt;FONT color="#FF0000"&gt;Possible MyRomeo Worm&lt;/FONT&gt; &amp;lt;\Device\Packet_{D3446BC6-343C-4C0C-8A29-AC6161C9D0F3}&amp;gt; &lt;FONT color="#FF0000"&gt;TCP 149.170.61.35:80&amp;nbsp; -&amp;gt; 10.10.50.154:100&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Apr 23 14:13:35 [143.5.113.3] snort[1976]: [1:800:1]&amp;nbsp; Virus - &lt;FONT color="#FF0000"&gt;Possible Resume Worm&lt;/FONT&gt; &amp;lt;\Device\Packet_{D3446BC6-343C-4C0C-8A29-AC6161C9D0F3}&amp;gt; &lt;FONT color="#FF0000"&gt;TCP 234.87.141.144:80&amp;nbsp; -&amp;gt; 10.10.50.17:100&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Apr 23 14:13:35 [143.5.113.3] snort: [1:801:1]&amp;nbsp; Virus - &lt;FONT color="#FF0000"&gt;Possible Worm - doc.vbs file&lt;/FONT&gt; [Classification: ] [Priority: ]: {PROTOCOL} &lt;FONT color="#FF0000"&gt;240.81.210.240:58287 -&amp;gt; 66.56.229.39:25&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Apr 23 14:13:35 [143.5.113.3] snort: [1:757:1]&amp;nbsp; Virus - &lt;FONT color="#FF0000"&gt;Possible Y2K Zelu Trojan&lt;/FONT&gt; [Classification: ] [Priority: ]: {PROTOCOL} &lt;FONT color="#FF0000"&gt;60.151.205.115:58287 -&amp;gt; 110.244.14.35:25&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Apr 23 14:13:50 [143.5.113.3] snort: [1:2266:1] &lt;FONT color="#FF0000"&gt;VIRUS OUTBOUND .doc file attachment&lt;/FONT&gt; [Classification: ] [Priority: ]: {PROTOCOL}&lt;FONT color="#FF0000"&gt; 234.182.233.181:58287 -&amp;gt; 0.235.220.175:25&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Apr 23 14:13:39 [143.5.113.3] snort[1976]: [1:1234:1]&amp;nbsp; &lt;FONT color="#FF0000"&gt;WEB-MISC VirusWall FtpSaveCSP access&lt;/FONT&gt; &amp;lt;\Device\Packet_{D3446BC6-343C-4C0C-8A29-AC6161C9D0F3}&amp;gt; &lt;FONT color="#FF0000"&gt;TCP 192.69.129.252:80&amp;nbsp; -&amp;gt; 10.10.50.30:100&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Apr 23 14:13:35 [143.5.113.3] snort: [1:730:1]&amp;nbsp; Virus - &lt;FONT color="#FF0000"&gt;Possible shs Worm&lt;/FONT&gt; [Classification: ] [Priority: ]: {PROTOCOL} &lt;FONT color="#FF0000"&gt;145.134.206.152:58287 -&amp;gt; 112.8.113.14:25&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;Apr 23 14:13:35 [143.5.113.3] snort[1976]: [1:732:1]&amp;nbsp; Virus - &lt;FONT color="#FF0000"&gt;Possible QAZ Worm Infection&lt;/FONT&gt; &amp;lt;\Device\Packet_{D3446BC6-343C-4C0C-8A29-AC6161C9D0F3}&amp;gt; &lt;FONT color="#FF0000"&gt;TCP 36.75.150.0:80&amp;nbsp; -&amp;gt; 10.10.50.229:100&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;FONT color="#000000"&gt;I only want to retrieve the virus names and IP addresses which are highlighted in red.&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;And this is my search query in text format:&lt;/P&gt;&lt;P&gt;source="General-linux-sql.log" sourcetype="Linux"&lt;BR /&gt;|rex field=_raw "Virus\s-\s(?&amp;lt;virus_name&amp;gt;.*)"&lt;BR /&gt;| table virus_name&lt;BR /&gt;| stats count by virus_name&lt;/P&gt;</description>
      <pubDate>Thu, 13 Aug 2020 13:00:13 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Extraction-using-rex/m-p/513903#M144231</guid>
      <dc:creator>rkris</dc:creator>
      <dc:date>2020-08-13T13:00:13Z</dc:date>
    </item>
    <item>
      <title>Re: Extraction using rex</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Extraction-using-rex/m-p/513922#M144238</link>
      <description>&lt;P&gt;Thanks for the sample data.&amp;nbsp; This rex command isn't perfect, but should get you close to want you seek.&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;| rex "snort(?:\[[^\]]+])?: \[[^\]]+] (?&amp;lt;virus&amp;gt;[^\[\&amp;lt;]+).+(?:\{PROTOCOL}|TCP) (?&amp;lt;ip&amp;gt;.*)"&lt;/LI-CODE&gt;</description>
      <pubDate>Thu, 13 Aug 2020 14:02:32 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Extraction-using-rex/m-p/513922#M144238</guid>
      <dc:creator>richgalloway</dc:creator>
      <dc:date>2020-08-13T14:02:32Z</dc:date>
    </item>
  </channel>
</rss>

