<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Extract fields from antivirus summary in Splunk Search</title>
    <link>https://community.splunk.com/t5/Splunk-Search/Extract-fields-from-antivirus-summary/m-p/187842#M187057</link>
    <description>&lt;P&gt;I've been trying to use the field extractor to get some useful data from my Sophos Anti-virus scan log. Unfortunately, it doesn't seem to work. I also can't figure out how I would break the event up using transforms.conf.&lt;/P&gt;

&lt;P&gt;The log contains the following summary when I search it in Splunk (it has it's own soucetype [SAV-too_small]).&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;20140604 042046 Scan 'Daily Scan 5am' completed.
20140604 042046 Summary of results for scan 'Daily Scan 5am':
        Items scanned: 198971
        Errors: 0
        Items quarantined: 0
        Items dealt with: 0
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;What I want is to get some kind of table or chart where it splits up "errors" and "items" as separate fields.&lt;/P&gt;

&lt;P&gt;Any help would be much appreciated&lt;BR /&gt;
Thanks,&lt;BR /&gt;
thommck&lt;/P&gt;</description>
    <pubDate>Wed, 04 Jun 2014 11:24:31 GMT</pubDate>
    <dc:creator>thommck</dc:creator>
    <dc:date>2014-06-04T11:24:31Z</dc:date>
    <item>
      <title>Extract fields from antivirus summary</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Extract-fields-from-antivirus-summary/m-p/187842#M187057</link>
      <description>&lt;P&gt;I've been trying to use the field extractor to get some useful data from my Sophos Anti-virus scan log. Unfortunately, it doesn't seem to work. I also can't figure out how I would break the event up using transforms.conf.&lt;/P&gt;

&lt;P&gt;The log contains the following summary when I search it in Splunk (it has it's own soucetype [SAV-too_small]).&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;20140604 042046 Scan 'Daily Scan 5am' completed.
20140604 042046 Summary of results for scan 'Daily Scan 5am':
        Items scanned: 198971
        Errors: 0
        Items quarantined: 0
        Items dealt with: 0
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;What I want is to get some kind of table or chart where it splits up "errors" and "items" as separate fields.&lt;/P&gt;

&lt;P&gt;Any help would be much appreciated&lt;BR /&gt;
Thanks,&lt;BR /&gt;
thommck&lt;/P&gt;</description>
      <pubDate>Wed, 04 Jun 2014 11:24:31 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Extract-fields-from-antivirus-summary/m-p/187842#M187057</guid>
      <dc:creator>thommck</dc:creator>
      <dc:date>2014-06-04T11:24:31Z</dc:date>
    </item>
    <item>
      <title>Re: Extract fields from antivirus summary</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Extract-fields-from-antivirus-summary/m-p/187843#M187058</link>
      <description>&lt;P&gt;Hi thommck,&lt;/P&gt;

&lt;P&gt;based on your provided data, use something like this:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt; your base search to get the events needed | rex field=_raw "Items\sscanned:\s(?&amp;lt;items&amp;gt;.+)" | rex field=_raw "Errors:\s(?&amp;lt;errors&amp;gt;.+) | table items errors
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;hope this helps ...&lt;/P&gt;

&lt;P&gt;cheers, MuS&lt;/P&gt;</description>
      <pubDate>Wed, 04 Jun 2014 11:35:05 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Extract-fields-from-antivirus-summary/m-p/187843#M187058</guid>
      <dc:creator>MuS</dc:creator>
      <dc:date>2014-06-04T11:35:05Z</dc:date>
    </item>
    <item>
      <title>Re: Extract fields from antivirus summary</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Extract-fields-from-antivirus-summary/m-p/187844#M187059</link>
      <description>&lt;P&gt;Based on your sample data it look like you might also benefit from using the mvexpand command. &lt;BR /&gt;
One of the examples on the documentation page for mvexpand uses rex, like has already been suggested, but also allows you to have other data (e.g., timestamp) from the original event applied.  &lt;/P&gt;

&lt;P&gt;&lt;A href="http://docs.splunk.com/Documentation/Splunk/6.1.1/SearchReference/Mvexpand"&gt;http://docs.splunk.com/Documentation/Splunk/6.1.1/SearchReference/Mvexpand&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 04 Jun 2014 12:24:17 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Extract-fields-from-antivirus-summary/m-p/187844#M187059</guid>
      <dc:creator>alterdego</dc:creator>
      <dc:date>2014-06-04T12:24:17Z</dc:date>
    </item>
    <item>
      <title>Re: Extract fields from antivirus summary</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Extract-fields-from-antivirus-summary/m-p/187845#M187060</link>
      <description>&lt;P&gt;Thanks, this works but is there a way to make it always index the data this way?&lt;/P&gt;</description>
      <pubDate>Wed, 04 Jun 2014 13:49:08 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Extract-fields-from-antivirus-summary/m-p/187845#M187060</guid>
      <dc:creator>thommck</dc:creator>
      <dc:date>2014-06-04T13:49:08Z</dc:date>
    </item>
    <item>
      <title>Re: Extract fields from antivirus summary</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Extract-fields-from-antivirus-summary/m-p/187846#M187061</link>
      <description>&lt;P&gt;I'll look into this, thanks&lt;/P&gt;</description>
      <pubDate>Wed, 04 Jun 2014 13:49:23 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Extract-fields-from-antivirus-summary/m-p/187846#M187061</guid>
      <dc:creator>thommck</dc:creator>
      <dc:date>2014-06-04T13:49:23Z</dc:date>
    </item>
    <item>
      <title>Re: Extract fields from antivirus summary</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Extract-fields-from-antivirus-summary/m-p/187847#M187062</link>
      <description>&lt;P&gt;Sure, read the docs about &lt;A href="http://docs.splunk.com/Documentation/Splunk/6.1.1/Knowledge/Createandmaintainsearch-timefieldextractionsthroughconfigurationfiles"&gt;field extraction using conf files&lt;/A&gt;. This will extract the fields at search time once configured. If you prefer to have it extracted at index time, read the docs about &lt;A href="http://docs.splunk.com/Documentation/Splunk/6.1.1/Data/Aboutindexedfieldextraction"&gt;indexed field extraction&lt;/A&gt;.&lt;/P&gt;

&lt;P&gt;cheers, MuS&lt;/P&gt;

&lt;P&gt;pls, mark this as answered by accepting the answer - thx&lt;/P&gt;</description>
      <pubDate>Wed, 04 Jun 2014 15:14:21 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Extract-fields-from-antivirus-summary/m-p/187847#M187062</guid>
      <dc:creator>MuS</dc:creator>
      <dc:date>2014-06-04T15:14:21Z</dc:date>
    </item>
  </channel>
</rss>

