<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Extraction using rex in Splunk Search</title>
    <link>https://community.splunk.com/t5/Splunk-Search/Extraction-using-rex/m-p/514080#M144297</link>
    <description>&lt;P&gt;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/214410"&gt;@isoutamo&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;A base query like this? :&amp;nbsp;&lt;/P&gt;&lt;P&gt;source="General-linux-sql.log" sourcetype="Linux"&lt;/P&gt;</description>
    <pubDate>Fri, 14 Aug 2020 11:51:58 GMT</pubDate>
    <dc:creator>rkris</dc:creator>
    <dc:date>2020-08-14T11:51:58Z</dc:date>
    <item>
      <title>Extraction using rex</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Extraction-using-rex/m-p/513750#M144178</link>
      <description>&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Splunk2_qns1.PNG" style="width: 344px;"&gt;&lt;img src="https://community.splunk.com/t5/image/serverpage/image-id/10222iEBC2BE93E9E060F8/image-dimensions/344x329?v=v2" width="344" height="329" role="button" title="Splunk2_qns1.PNG" alt="Splunk2_qns1.PNG" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;How do I use rex to extract the backdoor info and the IP addresses so that I can display this info in my splunk dashboard?&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 12 Aug 2020 16:39:55 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Extraction-using-rex/m-p/513750#M144178</guid>
      <dc:creator>rkris</dc:creator>
      <dc:date>2020-08-12T16:39:55Z</dc:date>
    </item>
    <item>
      <title>Re: Extraction using rex</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Extraction-using-rex/m-p/513752#M144179</link>
      <description>&lt;P&gt;Please send those events as text, so the community could Help you with regex.&lt;/P&gt;&lt;P&gt;r. Ismo&lt;/P&gt;</description>
      <pubDate>Wed, 12 Aug 2020 17:12:28 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Extraction-using-rex/m-p/513752#M144179</guid>
      <dc:creator>isoutamo</dc:creator>
      <dc:date>2020-08-12T17:12:28Z</dc:date>
    </item>
    <item>
      <title>Re: Extraction using rex</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Extraction-using-rex/m-p/513908#M144234</link>
      <description>&lt;P&gt;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/214410"&gt;@isoutamo&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;These are my events in text format:&lt;/P&gt;&lt;P&gt;&lt;FONT color="#FF0000"&gt;BACKDOOR MISC sm4ck attempt&lt;/FONT&gt; [Classification: ] [Priority: ]: {PROTOCOL} &lt;FONT color="#FF0000"&gt;75.93.73.179:58287 -&amp;gt; 1.227.5.72:25&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;FONT color="#FF0000"&gt;BACKDOOR DeepThroat 3.1 Drive Info From Server&lt;/FONT&gt; &amp;lt;\Device\Packet_{D3446BC6-343C-4C0C-8A29-AC6161C9D0F3}&amp;gt; &lt;FONT color="#FF0000"&gt;TCP 31.95.30.207:80&amp;nbsp; -&amp;gt; 10.10.50.16:100&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;FONT color="#FF0000"&gt;BACKDOOR DeepThroat 3.1 Swap Mouse Buttons Client Request&lt;/FONT&gt; [Classification: ] [Priority: ]: {PROTOCOL} &lt;FONT color="#FF0000"&gt;198.15.21.160:58287 -&amp;gt; 158.170.160.216:25&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;FONT color="#FF0000"&gt;BACKDOOR BackOrifice access&lt;/FONT&gt; [Classification: ] [Priority: ]: {PROTOCOL} &lt;FONT color="#FF0000"&gt;155.226.107.174:58287 -&amp;gt; 203.153.54.84:25&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;FONT color="#FF0000"&gt;BACKDOOR MISC sm4ck attempt&lt;/FONT&gt; [Classification: ] [Priority: ]: {PROTOCOL} &lt;FONT color="#FF0000"&gt;75.93.73.179:58287 -&amp;gt; 1.227.5.72:25&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;FONT color="#FF0000"&gt;BACKDOOR BackOrifice access&lt;/FONT&gt; &amp;lt;\Device\Packet_{D3446BC6-343C-4C0C-8A29-AC6161C9D0F3}&amp;gt; &lt;FONT color="#FF0000"&gt;TCP 191.174.4.187:80&amp;nbsp; -&amp;gt; 10.10.50.26:100&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;FONT color="#FF0000"&gt;BACKDOOR DeepThroat 3.1 All Window List Client Request&lt;/FONT&gt; &amp;lt;\Device\Packet_{D3446BC6-343C-4C0C-8A29-AC6161C9D0F3}&amp;gt; &lt;FONT color="#FF0000"&gt;TCP 178.135.115.196:80&amp;nbsp; -&amp;gt; 10.10.50.234:100&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;FONT color="#FF0000"&gt;BACKDOOR HackAttack 1.20 Connect&lt;/FONT&gt; &amp;lt;\Device\Packet_{D3446BC6-343C-4C0C-8A29-AC6161C9D0F3}&amp;gt; &lt;FONT color="#FF0000"&gt;TCP 34.114.188.191:80&amp;nbsp; -&amp;gt; 10.10.50.126:100&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;FONT color="#FF0000"&gt;Master's Paradise98 backdoor for Windows&lt;/FONT&gt; &amp;amp; from &lt;FONT color="#FF0000"&gt;192.168.34.6 to 10.10.18.60&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;FONT color="#FF0000"&gt;BACKDOOR DeepThroat 3.1 E-Mail Info Client Request&lt;/FONT&gt; &amp;lt;\Device\Packet_{D3446BC6-343C-4C0C-8A29-AC6161C9D0F3}&amp;gt; &lt;FONT color="#FF0000"&gt;TCP 218.224.198.5:80&amp;nbsp; -&amp;gt; 10.10.50.167:100&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;FONT color="#FF0000"&gt;BACKDOOR DeepThroat 3.1 Server Password Change Client Request&lt;/FONT&gt; &amp;lt;\Device\Packet_{D3446BC6-343C-4C0C-8A29-AC6161C9D0F3}&amp;gt; &lt;FONT color="#FF0000"&gt;TCP 20.75.220.146:80&amp;nbsp; -&amp;gt; 10.10.50.41:100&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;FONT color="#FF0000"&gt;BACKDOOR DeepThroat 3.1 Run Program Normal Client Request&lt;/FONT&gt; [Classification: ] [Priority: ]: {PROTOCOL} &lt;FONT color="#FF0000"&gt;103.63.71.129:58287 -&amp;gt; 155.32.118.92:25&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;FONT color="#FF0000"&gt;BACKDOOR Doly 2.0 access&lt;/FONT&gt; [Classification: ] [Priority: ]: {PROTOCOL} &lt;FONT color="#FF0000"&gt;237.194.170.123:58287 -&amp;gt; 9.208.133.84:25&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;FONT color="#FF0000"&gt;BACKDOOR HackAttack 1.20 Connect&lt;/FONT&gt; &amp;lt;\Device\Packet_{D3446BC6-343C-4C0C-8A29-AC6161C9D0F3}&amp;gt; &lt;FONT color="#FF0000"&gt;TCP 34.114.188.191:80&amp;nbsp; -&amp;gt; 10.10.50.126:100&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;FONT color="#FF0000"&gt;AOL Admin backdoor for Windows and AOL&lt;/FONT&gt; &amp;amp; from &lt;FONT color="#FF0000"&gt;207.125.33.2 to 10.10.18.50&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &lt;FONT color="#FF0000"&gt;Backdoor: HP OpenView hidden SNMP community&lt;/FONT&gt; &amp;amp; from &lt;FONT color="#FF0000"&gt;109.48.111.123 to 10.10.18.54&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;FONT color="#FF0000"&gt;BACKDOOR DeepThroat 3.1 Swap Mouse Buttons Client Request&lt;/FONT&gt; [Classification: ] [Priority: ]: {PROTOCOL} &lt;FONT color="#FF0000"&gt;198.15.21.160:58287 -&amp;gt; 158.170.160.216:25&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;FONT color="#FF0000"&gt;BACKDOOR DeepThroat 3.1 Hide/Show Start Button Client Request&lt;/FONT&gt; &amp;lt;\Device\Packet_{D3446BC6-343C-4C0C-8A29-AC6161C9D0F3}&amp;gt; &lt;FONT color="#FF0000"&gt;TCP 9.83.177.135:80&amp;nbsp; -&amp;gt; 10.10.50.53:100&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;FONT color="#FF0000"&gt;BACKDOOR DeepThroat 3.1 Server Active on Network&lt;/FONT&gt; &amp;lt;\Device\Packet_{D3446BC6-343C-4C0C-8A29-AC6161C9D0F3}&amp;gt; &lt;FONT color="#FF0000"&gt;TCP 1.68.247.43:80&amp;nbsp; -&amp;gt; 10.10.50.218:100&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;FONT color="#FF0000"&gt;Master's Paradise98 backdoor for Windows&lt;/FONT&gt; &amp;amp; from &lt;FONT color="#FF0000"&gt;192.168.34.6 to 10.10.18.6&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;FONT color="#FF0000"&gt;BACKDOOR DeepThroat 3.1 Resolution Change Client Request&lt;/FONT&gt; [Classification: ] [Priority: ]: {PROTOCOL} &lt;FONT color="#FF0000"&gt;72.3.15.96:58287 -&amp;gt; 26.211.133.37:25&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;FONT color="#FF0000"&gt;BACKDOOR MISC linux rootkit attempt&lt;/FONT&gt; &amp;lt;\Device\Packet_{D3446BC6-343C-4C0C-8A29-AC6161C9D0F3}&amp;gt; &lt;FONT color="#FF0000"&gt;TCP 23.173.136.97:80&amp;nbsp; -&amp;gt; 10.10.50.33:100&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;FONT color="#FF0000"&gt;BACKDOOR BackOrifice access&lt;/FONT&gt; &amp;lt;\Device\Packet_{D3446BC6-343C-4C0C-8A29-AC6161C9D0F3}&amp;gt; &lt;FONT color="#FF0000"&gt;TCP 191.174.4.187:80&amp;nbsp; -&amp;gt; 10.10.50.26:100&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;FONT color="#FF0000"&gt;BACKDOOR Doly 2.0 access&lt;/FONT&gt; &amp;lt;\Device\Packet_{D3446BC6-343C-4C0C-8A29-AC6161C9D0F3}&amp;gt; &lt;FONT color="#FF0000"&gt;TCP 168.248.174.125:80&amp;nbsp; -&amp;gt; 10.10.50.20:100&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;FONT color="#000000"&gt;I only need to extract the backdoor names and IP address which are highlighted in red.&lt;/FONT&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 13 Aug 2020 13:15:20 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Extraction-using-rex/m-p/513908#M144234</guid>
      <dc:creator>rkris</dc:creator>
      <dc:date>2020-08-13T13:15:20Z</dc:date>
    </item>
    <item>
      <title>Re: Extraction using rex</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Extraction-using-rex/m-p/513974#M144256</link>
      <description>&lt;P&gt;Hi&lt;/P&gt;&lt;P&gt;Probably this is not an optimal solution, but it seems to work with you data.&lt;/P&gt;&lt;LI-CODE lang="java"&gt;index=_internal 
| head 1
| eval _raw="BACKDOOR MISC sm4ck attempt [Classification: ] [Priority: ]: {PROTOCOL} 75.93.73.179:58287 -&amp;gt; 1.227.5.72:25
BACKDOOR DeepThroat 3.1 Drive Info From Server &amp;lt;\Device\Packet_{D3446BC6-343C-4C0C-8A29-AC6161C9D0F3}&amp;gt; TCP 31.95.30.207:80  -&amp;gt; 10.10.50.16:100
BACKDOOR DeepThroat 3.1 Swap Mouse Buttons Client Request [Classification: ] [Priority: ]: {PROTOCOL} 198.15.21.160:58287 -&amp;gt; 158.170.160.216:25
BACKDOOR BackOrifice access [Classification: ] [Priority: ]: {PROTOCOL} 155.226.107.174:58287 -&amp;gt; 203.153.54.84:25
BACKDOOR MISC sm4ck attempt [Classification: ] [Priority: ]: {PROTOCOL} 75.93.73.179:58287 -&amp;gt; 1.227.5.72:25
BACKDOOR BackOrifice access &amp;lt;\Device\Packet_{D3446BC6-343C-4C0C-8A29-AC6161C9D0F3}&amp;gt; TCP 191.174.4.187:80  -&amp;gt; 10.10.50.26:100
BACKDOOR DeepThroat 3.1 All Window List Client Request &amp;lt;\Device\Packet_{D3446BC6-343C-4C0C-8A29-AC6161C9D0F3}&amp;gt; TCP 178.135.115.196:80  -&amp;gt; 10.10.50.234:100
BACKDOOR HackAttack 1.20 Connect &amp;lt;\Device\Packet_{D3446BC6-343C-4C0C-8A29-AC6161C9D0F3}&amp;gt; TCP 34.114.188.191:80  -&amp;gt; 10.10.50.126:100
Master's Paradise98 backdoor for Windows &amp;amp; from 192.168.34.6 to 10.10.18.60
BACKDOOR DeepThroat 3.1 E-Mail Info Client Request &amp;lt;\Device\Packet_{D3446BC6-343C-4C0C-8A29-AC6161C9D0F3}&amp;gt; TCP 218.224.198.5:80  -&amp;gt; 10.10.50.167:100
BACKDOOR DeepThroat 3.1 Server Password Change Client Request &amp;lt;\Device\Packet_{D3446BC6-343C-4C0C-8A29-AC6161C9D0F3}&amp;gt; TCP 20.75.220.146:80  -&amp;gt; 10.10.50.41:100
BACKDOOR DeepThroat 3.1 Run Program Normal Client Request [Classification: ] [Priority: ]: {PROTOCOL} 103.63.71.129:58287 -&amp;gt; 155.32.118.92:25
BACKDOOR Doly 2.0 access [Classification: ] [Priority: ]: {PROTOCOL} 237.194.170.123:58287 -&amp;gt; 9.208.133.84:25
BACKDOOR HackAttack 1.20 Connect &amp;lt;\Device\Packet_{D3446BC6-343C-4C0C-8A29-AC6161C9D0F3}&amp;gt; TCP 34.114.188.191:80  -&amp;gt; 10.10.50.126:100
      AOL Admin backdoor for Windows and AOL &amp;amp; from 207.125.33.2 to 10.10.18.50
      Backdoor: HP OpenView hidden SNMP community &amp;amp; from 109.48.111.123 to 10.10.18.54
BACKDOOR DeepThroat 3.1 Swap Mouse Buttons Client Request [Classification: ] [Priority: ]: {PROTOCOL} 198.15.21.160:58287 -&amp;gt; 158.170.160.216:25
BACKDOOR DeepThroat 3.1 Hide/Show Start Button Client Request &amp;lt;\Device\Packet_{D3446BC6-343C-4C0C-8A29-AC6161C9D0F3}&amp;gt; TCP 9.83.177.135:80  -&amp;gt; 10.10.50.53:100
BACKDOOR DeepThroat 3.1 Server Active on Network &amp;lt;\Device\Packet_{D3446BC6-343C-4C0C-8A29-AC6161C9D0F3}&amp;gt; TCP 1.68.247.43:80  -&amp;gt; 10.10.50.218:100
Master's Paradise98 backdoor for Windows &amp;amp; from 192.168.34.6 to 10.10.18.6
BACKDOOR DeepThroat 3.1 Resolution Change Client Request [Classification: ] [Priority: ]: {PROTOCOL} 72.3.15.96:58287 -&amp;gt; 26.211.133.37:25
BACKDOOR MISC linux rootkit attempt &amp;lt;\Device\Packet_{D3446BC6-343C-4C0C-8A29-AC6161C9D0F3}&amp;gt; TCP 23.173.136.97:80  -&amp;gt; 10.10.50.33:100
BACKDOOR BackOrifice access &amp;lt;\Device\Packet_{D3446BC6-343C-4C0C-8A29-AC6161C9D0F3}&amp;gt; TCP 191.174.4.187:80  -&amp;gt; 10.10.50.26:100
BACKDOOR Doly 2.0 access &amp;lt;\Device\Packet_{D3446BC6-343C-4C0C-8A29-AC6161C9D0F3}&amp;gt; TCP 168.248.174.125:80  -&amp;gt; 10.10.50.20:100"
| rename COMMENT AS "Previous prepare test data. Replace it with your query with search word backdoor"
| rex max_match=0 "^(?&amp;lt;msg&amp;gt;[^\[&amp;lt;\&amp;amp;]+)\s?.*[^\d](?&amp;lt;src&amp;gt;\d{1,3}\.\d{1,3}\.\d{1,3}\.\d{1,3})(:\d+)?\s+(-&amp;gt;)?(to)?\s(?&amp;lt;dst&amp;gt;\d{1,3}\.\d{1,3}\.\d{1,3}\.\d{1,3})(:\d+)?"
| table src dst msg&lt;/LI-CODE&gt;&lt;P&gt;max_match=0 is probably unneeded with your real query. This expect that your base query gives only lines which contains work "backdoor".&lt;/P&gt;&lt;P&gt;r. Ismo&lt;/P&gt;</description>
      <pubDate>Thu, 13 Aug 2020 19:42:07 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Extraction-using-rex/m-p/513974#M144256</guid>
      <dc:creator>isoutamo</dc:creator>
      <dc:date>2020-08-13T19:42:07Z</dc:date>
    </item>
    <item>
      <title>Re: Extraction using rex</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Extraction-using-rex/m-p/514076#M144295</link>
      <description>&lt;P&gt;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/214410"&gt;@isoutamo&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;These are the results i get after using your code:&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="splunk_qns1.PNG" style="width: 568px;"&gt;&lt;img src="https://community.splunk.com/t5/image/serverpage/image-id/10253i3603BBAE31E6E8D4/image-dimensions/568x314?v=v2" width="568" height="314" role="button" title="splunk_qns1.PNG" alt="splunk_qns1.PNG" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;Is there a way to ensure that the backdoor values appear on the same line as the IP Addresses?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 14 Aug 2020 11:37:41 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Extraction-using-rex/m-p/514076#M144295</guid>
      <dc:creator>rkris</dc:creator>
      <dc:date>2020-08-14T11:37:41Z</dc:date>
    </item>
    <item>
      <title>Re: Extraction using rex</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Extraction-using-rex/m-p/514077#M144296</link>
      <description>&lt;P&gt;Hi&lt;/P&gt;&lt;P&gt;You should use your base query which generate those events and then add lines after the next line&lt;/P&gt;&lt;P&gt;| rename COMMENTS as ...&lt;/P&gt;&lt;P&gt;Those first lines just generate example data based on what you have sent earlier.&lt;/P&gt;&lt;P&gt;r. Ismo&lt;/P&gt;</description>
      <pubDate>Fri, 14 Aug 2020 11:42:55 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Extraction-using-rex/m-p/514077#M144296</guid>
      <dc:creator>isoutamo</dc:creator>
      <dc:date>2020-08-14T11:42:55Z</dc:date>
    </item>
    <item>
      <title>Re: Extraction using rex</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Extraction-using-rex/m-p/514080#M144297</link>
      <description>&lt;P&gt;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/214410"&gt;@isoutamo&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;A base query like this? :&amp;nbsp;&lt;/P&gt;&lt;P&gt;source="General-linux-sql.log" sourcetype="Linux"&lt;/P&gt;</description>
      <pubDate>Fri, 14 Aug 2020 11:51:58 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Extraction-using-rex/m-p/514080#M144297</guid>
      <dc:creator>rkris</dc:creator>
      <dc:date>2020-08-14T11:51:58Z</dc:date>
    </item>
    <item>
      <title>Re: Extraction using rex</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Extraction-using-rex/m-p/514089#M144298</link>
      <description>&lt;P&gt;Yes and add backdoor also.&lt;/P&gt;&lt;LI-CODE lang="java"&gt;index=&amp;lt;YOUR INDEX HERE&amp;gt; source="General-linux-sql.log" sourcetype="Linux" backdoor
| rex "^(?&amp;lt;msg&amp;gt;[^\[&amp;lt;\&amp;amp;]+)\s?.*[^\d](?&amp;lt;src&amp;gt;\d{1,3}\.\d{1,3}\.\d{1,3}\.\d{1,3})(:\d+)?\s+(-&amp;gt;)?(to)?\s(?&amp;lt;dst&amp;gt;\d{1,3}\.\d{1,3}\.\d{1,3}\.\d{1,3})(:\d+)?"
| table src dst msg&lt;/LI-CODE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;If needed you can add max_match=0 to rex command, but as your event is oneliners that shouldn't needed.&lt;/P&gt;&lt;P&gt;r. Ismo&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 14 Aug 2020 12:58:30 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Extraction-using-rex/m-p/514089#M144298</guid>
      <dc:creator>isoutamo</dc:creator>
      <dc:date>2020-08-14T12:58:30Z</dc:date>
    </item>
    <item>
      <title>Re: Extraction using rex</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Extraction-using-rex/m-p/514095#M144300</link>
      <description>&lt;P&gt;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/214410"&gt;@isoutamo&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;What kind of value do i put in index?&lt;/P&gt;</description>
      <pubDate>Fri, 14 Aug 2020 13:09:57 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Extraction-using-rex/m-p/514095#M144300</guid>
      <dc:creator>rkris</dc:creator>
      <dc:date>2020-08-14T13:09:57Z</dc:date>
    </item>
    <item>
      <title>Re: Extraction using rex</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Extraction-using-rex/m-p/514142#M144305</link>
      <description>&lt;P&gt;It’s same where you are stored those log events. &amp;nbsp;Could be main or something else. Use the same index where you collect those examples. If you never use that then you could drop it away, even it best practices to always add it to the queries.&lt;/P&gt;&lt;P&gt;r. Ismo&lt;/P&gt;</description>
      <pubDate>Fri, 14 Aug 2020 15:13:29 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Extraction-using-rex/m-p/514142#M144305</guid>
      <dc:creator>isoutamo</dc:creator>
      <dc:date>2020-08-14T15:13:29Z</dc:date>
    </item>
  </channel>
</rss>

