<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Query syslog fields in Splunk Search</title>
    <link>https://community.splunk.com/t5/Splunk-Search/Query-syslog-fields/m-p/553654#M157197</link>
    <description>&lt;P&gt;Is the example you shared, the _raw message you get when searching your index?&lt;/P&gt;&lt;P&gt;Do you have any interesting fields already extracted for you?&lt;/P&gt;&lt;P&gt;Which part of the message do you want in data(?) host facility etc i.e can you provide a corresponding example of the expected output?&lt;/P&gt;</description>
    <pubDate>Sun, 30 May 2021 13:35:13 GMT</pubDate>
    <dc:creator>ITWhisperer</dc:creator>
    <dc:date>2021-05-30T13:35:13Z</dc:date>
    <item>
      <title>Query syslog fields</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Query-syslog-fields/m-p/553653#M157196</link>
      <description>&lt;P&gt;&lt;SPAN&gt;Dear all,&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;I have a syslog-ng relay server collecting syslog messages from remote network devices and saving them as log files. Then I have Splunk UF forwarding this data to the splunk cloud. Following is a sample message&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;May 30 04:23:54 192.168.1.132 &amp;lt;82&amp;gt;May 30 04:23:54 syslog-data-generator-01 This is a test message from b001-491 2021-05-30T04:23:54.116Z&lt;/LI-CODE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;And following is my inputs.conf&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;[monitor:///var/log/remotelogs/]
disabled = 0
sourcetype = syslog&lt;/LI-CODE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;I can see the messages collected from splunk cloud by querying _raw&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;My question: How would I write a query to display [data, host, facility, severity, message]&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Many thanks in advance&lt;/P&gt;</description>
      <pubDate>Sun, 30 May 2021 12:48:38 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Query-syslog-fields/m-p/553653#M157196</guid>
      <dc:creator>ChintanaM</dc:creator>
      <dc:date>2021-05-30T12:48:38Z</dc:date>
    </item>
    <item>
      <title>Re: Query syslog fields</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Query-syslog-fields/m-p/553654#M157197</link>
      <description>&lt;P&gt;Is the example you shared, the _raw message you get when searching your index?&lt;/P&gt;&lt;P&gt;Do you have any interesting fields already extracted for you?&lt;/P&gt;&lt;P&gt;Which part of the message do you want in data(?) host facility etc i.e can you provide a corresponding example of the expected output?&lt;/P&gt;</description>
      <pubDate>Sun, 30 May 2021 13:35:13 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Query-syslog-fields/m-p/553654#M157197</guid>
      <dc:creator>ITWhisperer</dc:creator>
      <dc:date>2021-05-30T13:35:13Z</dc:date>
    </item>
    <item>
      <title>Re: Query syslog fields</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Query-syslog-fields/m-p/553658#M157198</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/225168"&gt;@ITWhisperer&lt;/a&gt;&amp;nbsp;,&lt;/P&gt;&lt;P&gt;Thank you for taking time to read my question and respond&lt;/P&gt;&lt;P&gt;Following is what I see&lt;/P&gt;&lt;P&gt;sample message&lt;/P&gt;&lt;P&gt;&lt;EM&gt;&lt;STRONG&gt;&lt;SPAN class="t"&gt;May&lt;/SPAN&gt; &lt;SPAN class="t"&gt;30&lt;/SPAN&gt; &lt;SPAN class="t"&gt;04:23:54&lt;/SPAN&gt; &lt;SPAN class="t"&gt;192.168.1.132&lt;/SPAN&gt; &amp;lt;&lt;SPAN class="t"&gt;82&lt;/SPAN&gt;&amp;gt;&lt;SPAN class="t"&gt;May&lt;/SPAN&gt; &lt;SPAN class="t"&gt;30&lt;/SPAN&gt; &lt;SPAN class="t"&gt;04:23:54&lt;/SPAN&gt; &lt;SPAN class="t"&gt;syslog-data-generator-01&lt;/SPAN&gt; &lt;SPAN class="t"&gt;This&lt;/SPAN&gt; &lt;SPAN class="t"&gt;is&lt;/SPAN&gt; &lt;SPAN class="t"&gt;a&lt;/SPAN&gt; &lt;SPAN class="t"&gt;test&lt;/SPAN&gt; &lt;SPAN class="t"&gt;message&lt;/SPAN&gt; &lt;SPAN class="t"&gt;from&lt;/SPAN&gt; &lt;SPAN class="t"&gt;asanka-496&lt;/SPAN&gt; &lt;SPAN class="t h"&gt;&lt;SPAN class="t"&gt;2021-05-30T04:23:54&lt;/SPAN&gt;.&lt;SPAN class="t"&gt;168Z&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN class="t h"&gt;screen-shot&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="ChintanaM_0-1622382039314.png" style="width: 400px;"&gt;&lt;img src="https://community.splunk.com/t5/image/serverpage/image-id/14373i888A7D080958C9DD/image-size/medium?v=v2&amp;amp;px=400" role="button" title="ChintanaM_0-1622382039314.png" alt="ChintanaM_0-1622382039314.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sun, 30 May 2021 13:41:37 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Query-syslog-fields/m-p/553658#M157198</guid>
      <dc:creator>ChintanaM</dc:creator>
      <dc:date>2021-05-30T13:41:37Z</dc:date>
    </item>
    <item>
      <title>Re: Query syslog fields</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Query-syslog-fields/m-p/553659#M157199</link>
      <description>&lt;P&gt;So which part of the message is which?&lt;/P&gt;&lt;P&gt;&lt;EM&gt;&lt;STRONG&gt;&lt;FONT color="#FF0000"&gt;&lt;SPAN class="t"&gt;May&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN class="t"&gt;30&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN class="t"&gt;04:23:54&lt;/SPAN&gt;&lt;/FONT&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;FONT color="#FF00FF"&gt;&lt;SPAN class="t"&gt;192.168.1.132&lt;/SPAN&gt;&lt;/FONT&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&amp;lt;&lt;FONT color="#00CCFF"&gt;&lt;SPAN class="t"&gt;82&lt;/SPAN&gt;&lt;/FONT&gt;&amp;gt;&lt;FONT color="#FF0000"&gt;&lt;SPAN class="t"&gt;May&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN class="t"&gt;30&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN class="t"&gt;04:23:54&lt;/SPAN&gt;&lt;/FONT&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;FONT color="#00FF00"&gt;&lt;SPAN class="t"&gt;syslog-data-generator-01&lt;/SPAN&gt;&lt;/FONT&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;FONT color="#993366"&gt;&lt;SPAN class="t"&gt;This&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN class="t"&gt;is&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN class="t"&gt;a&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN class="t"&gt;test&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN class="t"&gt;message&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN class="t"&gt;from&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN class="t"&gt;asanka-496&lt;/SPAN&gt;&lt;/FONT&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;FONT color="#FF0000"&gt;&lt;SPAN class="t h"&gt;&lt;SPAN class="t"&gt;2021-05-30T04:23:54&lt;/SPAN&gt;.&lt;SPAN class="t"&gt;168Z&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/STRONG&gt;&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT color="#FF0000"&gt;&lt;EM&gt;data or date?&lt;/EM&gt;&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT color="#FF00FF"&gt;&lt;EM&gt;host&lt;/EM&gt;&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT color="#00FF00"&gt;&lt;EM&gt;facility&lt;/EM&gt;&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT color="#00CCFF"&gt;&lt;EM&gt;severity&lt;/EM&gt;&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT color="#993366"&gt;&lt;EM&gt;message&lt;/EM&gt;&lt;/FONT&gt;&lt;/P&gt;</description>
      <pubDate>Sun, 30 May 2021 13:47:42 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Query-syslog-fields/m-p/553659#M157199</guid>
      <dc:creator>ITWhisperer</dc:creator>
      <dc:date>2021-05-30T13:47:42Z</dc:date>
    </item>
    <item>
      <title>Re: Query syslog fields</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Query-syslog-fields/m-p/553660#M157200</link>
      <description>&lt;P&gt;typo &lt;STRONG&gt;date&lt;/STRONG&gt; should be &lt;STRONG&gt;date&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&lt;EM&gt;&lt;FONT color="#FF0000"&gt;&lt;SPAN class="t"&gt;May&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN class="t"&gt;30&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN class="t"&gt;04:23:54 - date&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/EM&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&lt;EM&gt;&lt;FONT color="#FF0000"&gt;&lt;SPAN class="t"&gt;&lt;FONT color="#FF00FF"&gt;192.168.1.132 - host&lt;/FONT&gt;&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/EM&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&lt;EM&gt;&lt;FONT color="#FF0000"&gt;&lt;SPAN class="t"&gt;&lt;FONT color="#FF00FF"&gt;&amp;lt;&lt;FONT color="#00CCFF"&gt;82&lt;/FONT&gt;&amp;gt; - PRI&amp;nbsp; (facility, severity)&lt;/FONT&gt;&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/EM&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&lt;EM&gt;&lt;FONT color="#FF0000"&gt;&lt;SPAN class="t"&gt;&lt;FONT color="#FF00FF"&gt;Rest is the message&lt;/FONT&gt;&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/EM&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;Cheers&lt;/P&gt;</description>
      <pubDate>Sun, 30 May 2021 14:04:06 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Query-syslog-fields/m-p/553660#M157200</guid>
      <dc:creator>ChintanaM</dc:creator>
      <dc:date>2021-05-30T14:04:06Z</dc:date>
    </item>
    <item>
      <title>Re: Query syslog fields</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Query-syslog-fields/m-p/553661#M157201</link>
      <description>&lt;P&gt;host is already extracted so you might want to use a different name&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;| rex "(?&amp;lt;date&amp;gt;\w+\s\d+\s\d\d:\d\d:\d\d)\s(?&amp;lt;host&amp;gt;[^\s]+)\s&amp;lt;(?&amp;lt;severity&amp;gt;\d+)&amp;gt;(?&amp;lt;msg&amp;gt;.*)"&lt;/LI-CODE&gt;</description>
      <pubDate>Sun, 30 May 2021 14:15:21 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Query-syslog-fields/m-p/553661#M157201</guid>
      <dc:creator>ITWhisperer</dc:creator>
      <dc:date>2021-05-30T14:15:21Z</dc:date>
    </item>
    <item>
      <title>Re: Query syslog fields</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Query-syslog-fields/m-p/553662#M157202</link>
      <description>&lt;P&gt;you are awesome mate !!!!!!! thank you&lt;/P&gt;</description>
      <pubDate>Sun, 30 May 2021 14:17:22 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Query-syslog-fields/m-p/553662#M157202</guid>
      <dc:creator>ChintanaM</dc:creator>
      <dc:date>2021-05-30T14:17:22Z</dc:date>
    </item>
  </channel>
</rss>

