<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Extracting from log file in Splunk Search</title>
    <link>https://community.splunk.com/t5/Splunk-Search/Extracting-from-log-file/m-p/263091#M189790</link>
    <description>&lt;P&gt;I have the following custom log file&lt;/P&gt;

&lt;P&gt;2016-07-15_05:58:57.5857-est label="adbcf" lastmodifiedtime="2016-07-15_05:58:57.5857-est" filename="13948.xml" directory="d:\temp" operation="deleted" size_in_bytes=434493&lt;BR /&gt;
2016-07-15_17:57:18.5718-est monitor_label="abcd" lastmodifiedtime="2016-07-15_17:57:18.5718-est" filename="late123" directory="d:\temp" operation="created" size_in_bytes=673639&lt;/P&gt;

&lt;P&gt;I am able to ingest into Splunk, however when i search for operation="deleted" i did not get the result.&lt;BR /&gt;
when i search with "deleted" i am able to get the result. operation="created" returns results.&lt;BR /&gt;
In the interesting field it only shows "created" value for operation even though both created and deleted are present in the results.&lt;/P&gt;

&lt;P&gt;Is there anything that could be done in the custom log differently to make Splunk include the "deleted"&lt;BR /&gt;
 | timechart span=1h count by operation gives only created and ignores deleted.&lt;/P&gt;

&lt;P&gt;Thanks in advance. &lt;/P&gt;</description>
    <pubDate>Tue, 29 Sep 2020 10:15:55 GMT</pubDate>
    <dc:creator>nravichandran</dc:creator>
    <dc:date>2020-09-29T10:15:55Z</dc:date>
    <item>
      <title>Extracting from log file</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Extracting-from-log-file/m-p/263091#M189790</link>
      <description>&lt;P&gt;I have the following custom log file&lt;/P&gt;

&lt;P&gt;2016-07-15_05:58:57.5857-est label="adbcf" lastmodifiedtime="2016-07-15_05:58:57.5857-est" filename="13948.xml" directory="d:\temp" operation="deleted" size_in_bytes=434493&lt;BR /&gt;
2016-07-15_17:57:18.5718-est monitor_label="abcd" lastmodifiedtime="2016-07-15_17:57:18.5718-est" filename="late123" directory="d:\temp" operation="created" size_in_bytes=673639&lt;/P&gt;

&lt;P&gt;I am able to ingest into Splunk, however when i search for operation="deleted" i did not get the result.&lt;BR /&gt;
when i search with "deleted" i am able to get the result. operation="created" returns results.&lt;BR /&gt;
In the interesting field it only shows "created" value for operation even though both created and deleted are present in the results.&lt;/P&gt;

&lt;P&gt;Is there anything that could be done in the custom log differently to make Splunk include the "deleted"&lt;BR /&gt;
 | timechart span=1h count by operation gives only created and ignores deleted.&lt;/P&gt;

&lt;P&gt;Thanks in advance. &lt;/P&gt;</description>
      <pubDate>Tue, 29 Sep 2020 10:15:55 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Extracting-from-log-file/m-p/263091#M189790</guid>
      <dc:creator>nravichandran</dc:creator>
      <dc:date>2020-09-29T10:15:55Z</dc:date>
    </item>
    <item>
      <title>Re: Extracting from log file</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Extracting-from-log-file/m-p/263092#M189791</link>
      <description>&lt;P&gt;I am not sure, but, pls search using the index name... &lt;/P&gt;

&lt;BLOCKQUOTE&gt;
&lt;BLOCKQUOTE&gt;
&lt;P&gt;index=indexname "created" &lt;/P&gt;
&lt;/BLOCKQUOTE&gt;
&lt;/BLOCKQUOTE&gt;</description>
      <pubDate>Sat, 16 Jul 2016 01:30:32 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Extracting-from-log-file/m-p/263092#M189791</guid>
      <dc:creator>inventsekar</dc:creator>
      <dc:date>2016-07-16T01:30:32Z</dc:date>
    </item>
    <item>
      <title>Re: Extracting from log file</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Extracting-from-log-file/m-p/263093#M189792</link>
      <description>&lt;P&gt;You could extract it in your search&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;    ... |  rex "operation=\"(?&amp;lt;operation&amp;gt;\w+)" | timechart span=1h count by operation
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;You could also add this rex in the Field Extraction UI to make this field available to every search.'&lt;/P&gt;</description>
      <pubDate>Sat, 16 Jul 2016 01:33:05 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Extracting-from-log-file/m-p/263093#M189792</guid>
      <dc:creator>sundareshr</dc:creator>
      <dc:date>2016-07-16T01:33:05Z</dc:date>
    </item>
    <item>
      <title>Re: Extracting from log file</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Extracting-from-log-file/m-p/263094#M189793</link>
      <description>&lt;P&gt;index=... | rex "operation=\"(?\w+)" |  table operation returns  - created only eventhough deleted is present.&lt;/P&gt;</description>
      <pubDate>Sat, 16 Jul 2016 01:47:13 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Extracting-from-log-file/m-p/263094#M189793</guid>
      <dc:creator>nravichandran</dc:creator>
      <dc:date>2016-07-16T01:47:13Z</dc:date>
    </item>
    <item>
      <title>Re: Extracting from log file</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Extracting-from-log-file/m-p/263095#M189794</link>
      <description>&lt;P&gt;One more information i want to share. Since the logs are generating at the same time will it have any effect?&lt;/P&gt;

&lt;P&gt;7/15/16&lt;BR /&gt;
9:44:52.445 PM&lt;BR /&gt;&lt;BR /&gt;
2016-07-15_21:44:52.4452-est monitor_label="aaai" lastmodifiedtime="2016-07-15_21:44:52.4452-est" filename="late3.new" directory="d:\tesb11" operation="created" size_in_bytes=9457&lt;BR /&gt;
2016-07-15_09:44:52.4452-est monitor_label="sssi" lastmodifiedtime="2016-07-15_09:44:52.4452-est" filename="113626.xml" directory="d:\testemp" operation="deleted" size_in_bytes=316005&lt;/P&gt;</description>
      <pubDate>Tue, 29 Sep 2020 10:15:58 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Extracting-from-log-file/m-p/263095#M189794</guid>
      <dc:creator>nravichandran</dc:creator>
      <dc:date>2020-09-29T10:15:58Z</dc:date>
    </item>
    <item>
      <title>Re: Extracting from log file</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Extracting-from-log-file/m-p/263096#M189795</link>
      <description>&lt;P&gt;Try this regex then&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt; ... |  rex "(?&amp;lt;operation&amp;gt;deleted|created)" | timechart span=1h count by operation
&lt;/CODE&gt;&lt;/PRE&gt;</description>
      <pubDate>Sat, 16 Jul 2016 02:24:08 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Extracting-from-log-file/m-p/263096#M189795</guid>
      <dc:creator>sundareshr</dc:creator>
      <dc:date>2016-07-16T02:24:08Z</dc:date>
    </item>
    <item>
      <title>Re: Extracting from log file</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Extracting-from-log-file/m-p/263097#M189796</link>
      <description>&lt;P&gt;Please try the following rex command:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;| rex max_match=0 "operation=\"(?&amp;lt;operation&amp;gt;[^\"]*?)\""
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;Do you still have one result with a multivalue "operation" field?&lt;/P&gt;</description>
      <pubDate>Sat, 16 Jul 2016 02:26:15 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Extracting-from-log-file/m-p/263097#M189796</guid>
      <dc:creator>Raschko</dc:creator>
      <dc:date>2016-07-16T02:26:15Z</dc:date>
    </item>
    <item>
      <title>Re: Extracting from log file</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Extracting-from-log-file/m-p/263098#M189797</link>
      <description>&lt;P&gt;I was able to figure out the rex. The following works! Thanks everyone.&lt;/P&gt;

&lt;P&gt;rex field=_raw "(?ms)^(?:[^\"\n]*\"){9}(?P\w+)"&lt;/P&gt;</description>
      <pubDate>Mon, 18 Jul 2016 17:20:25 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Extracting-from-log-file/m-p/263098#M189797</guid>
      <dc:creator>nravichandran</dc:creator>
      <dc:date>2016-07-18T17:20:25Z</dc:date>
    </item>
  </channel>
</rss>

