<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Information extraction in Splunk Search</title>
    <link>https://community.splunk.com/t5/Splunk-Search/Information-extraction/m-p/582541#M202893</link>
    <description>&lt;P&gt;Hi folks,&lt;/P&gt;&lt;P&gt;Hoping you might be able to help.&lt;/P&gt;&lt;P&gt;I've some raw logs coming in and one of the "extracted" fields is a fields with all the system information I need e.g.&lt;/P&gt;&lt;P&gt;Remote Desktop Protocol: OS: Windows 10/Windows Server OS Build: 10.0.18362 Target Name: NACORP NetBIOS Domain Name: NACORP NetBIOS Computer Name: 1234ABC DNS Domain Name: na.corp.xxxxx.com System Time: 2021-12-12 22:55:40.534959 Authorized Use Only - v 041001 This system is for the use of authorized users only.&lt;/P&gt;&lt;P&gt;How do I extract specific pieces from it?&amp;nbsp; I need&amp;nbsp;NetBIOS Domain Name and&amp;nbsp;Computer Name and&amp;nbsp;System Time&lt;/P&gt;&lt;P&gt;I thought of using a regex but not sure how to build&amp;nbsp;it since&amp;nbsp;NetBIOS Domain Name values can be of different variations e'g one will be&amp;nbsp;NACORP another one will be USON and another wil be NACORP.LOCAL&lt;/P&gt;&lt;P&gt;Similar with the computer name - there's no unified naming convention - it depends on a country we get the logs from. some can have a "-" in the middle, some will have a "." etc.&lt;/P&gt;&lt;P&gt;Any hints and tips on how to tackle&amp;nbsp;it will be more than appreciated!&lt;/P&gt;</description>
    <pubDate>Wed, 26 Jan 2022 14:04:01 GMT</pubDate>
    <dc:creator>klaudiac</dc:creator>
    <dc:date>2022-01-26T14:04:01Z</dc:date>
    <item>
      <title>Information extraction</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Information-extraction/m-p/582541#M202893</link>
      <description>&lt;P&gt;Hi folks,&lt;/P&gt;&lt;P&gt;Hoping you might be able to help.&lt;/P&gt;&lt;P&gt;I've some raw logs coming in and one of the "extracted" fields is a fields with all the system information I need e.g.&lt;/P&gt;&lt;P&gt;Remote Desktop Protocol: OS: Windows 10/Windows Server OS Build: 10.0.18362 Target Name: NACORP NetBIOS Domain Name: NACORP NetBIOS Computer Name: 1234ABC DNS Domain Name: na.corp.xxxxx.com System Time: 2021-12-12 22:55:40.534959 Authorized Use Only - v 041001 This system is for the use of authorized users only.&lt;/P&gt;&lt;P&gt;How do I extract specific pieces from it?&amp;nbsp; I need&amp;nbsp;NetBIOS Domain Name and&amp;nbsp;Computer Name and&amp;nbsp;System Time&lt;/P&gt;&lt;P&gt;I thought of using a regex but not sure how to build&amp;nbsp;it since&amp;nbsp;NetBIOS Domain Name values can be of different variations e'g one will be&amp;nbsp;NACORP another one will be USON and another wil be NACORP.LOCAL&lt;/P&gt;&lt;P&gt;Similar with the computer name - there's no unified naming convention - it depends on a country we get the logs from. some can have a "-" in the middle, some will have a "." etc.&lt;/P&gt;&lt;P&gt;Any hints and tips on how to tackle&amp;nbsp;it will be more than appreciated!&lt;/P&gt;</description>
      <pubDate>Wed, 26 Jan 2022 14:04:01 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Information-extraction/m-p/582541#M202893</guid>
      <dc:creator>klaudiac</dc:creator>
      <dc:date>2022-01-26T14:04:01Z</dc:date>
    </item>
    <item>
      <title>Re: Information extraction</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Information-extraction/m-p/582542#M202894</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/223748"&gt;@klaudiac&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;please try something like this:&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;| rex field=extracted_field "NetBIOS\s+Domain\s+Name:\s+(?&amp;lt;NetBIOS_Domains_Name&amp;gt;.*)\s+NetBIOS\s+Computer\s+Name:\s+(?&amp;lt;NetBIOS_Computer_Name&amp;gt;.*)\s+DNS.*System\s+Time:\s+(?&amp;lt;System_Time&amp;gt;.*)\s+Authorized"&lt;/LI-CODE&gt;&lt;P&gt;that you can test at&amp;nbsp;&lt;A href="https://regex101.com/r/ZiS0ey/1" target="_blank"&gt;https://regex101.com/r/ZiS0ey/1&lt;/A&gt;&lt;/P&gt;&lt;P&gt;Ciao.&lt;/P&gt;&lt;P&gt;Giuseppe&lt;/P&gt;</description>
      <pubDate>Wed, 26 Jan 2022 14:17:23 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Information-extraction/m-p/582542#M202894</guid>
      <dc:creator>gcusello</dc:creator>
      <dc:date>2022-01-26T14:17:23Z</dc:date>
    </item>
  </channel>
</rss>

