<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic How to extract IP hostname SplunkAgent and Machine architecture from splunkd_access log? in Splunk Search</title>
    <link>https://community.splunk.com/t5/Splunk-Search/How-to-extract-IP-hostname-SplunkAgent-and-Machine-architecture/m-p/639860#M221727</link>
    <description>&lt;P&gt;&lt;STRONG&gt;&lt;SPAN class=""&gt;10.179.130.56&lt;/SPAN&gt;&lt;/STRONG&gt; &lt;SPAN class=""&gt;-&lt;/SPAN&gt; &lt;SPAN class=""&gt;-&lt;/SPAN&gt;&lt;SPAN&gt; [&lt;/SPAN&gt;&lt;SPAN class=""&gt;14/Apr/2023:01:59:28.233&lt;/SPAN&gt;&lt;SPAN&gt; +&lt;/SPAN&gt;&lt;SPAN class=""&gt;0800&lt;/SPAN&gt;&lt;SPAN&gt;] "&lt;/SPAN&gt;&lt;SPAN class=""&gt;POST&lt;/SPAN&gt; &lt;SPAN class=""&gt;&lt;SPAN class=""&gt;/services/broker/phonehome/connection&lt;/SPAN&gt;_10.179.130.56_8089_10.179.130.56_&lt;STRONG&gt;MYETKPWSQL002&lt;/STRONG&gt;_918B12BB-35AB-452A-BAEB-592395125496&lt;/SPAN&gt; &lt;SPAN class=""&gt;HTTP/1.1&lt;/SPAN&gt;&lt;SPAN&gt;" &lt;/SPAN&gt;&lt;SPAN class=""&gt;200&lt;/SPAN&gt; &lt;SPAN class=""&gt;530&lt;/SPAN&gt;&lt;SPAN&gt; "&lt;/SPAN&gt;&lt;SPAN class=""&gt;-&lt;/SPAN&gt;&lt;SPAN&gt;" "&lt;/SPAN&gt;&lt;STRONG&gt;&lt;SPAN class=""&gt;Splunk/8.2.7&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN&gt; (&lt;/SPAN&gt;&lt;STRONG&gt;&lt;SPAN class=""&gt;Windows&lt;/SPAN&gt; &lt;SPAN class=""&gt;Server&lt;/SPAN&gt; &lt;SPAN class=""&gt;10&lt;/SPAN&gt; &lt;SPAN class=""&gt;Standard&lt;/SPAN&gt; &lt;SPAN class=""&gt;Edition&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN&gt;; &lt;/SPAN&gt;&lt;SPAN class=""&gt;arch=x64&lt;/SPAN&gt;&lt;SPAN&gt;)" &lt;/SPAN&gt;&lt;SPAN class=""&gt;-&lt;/SPAN&gt; &lt;SPAN class=""&gt;1ms&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN class=""&gt;&lt;STRONG&gt;10.16.36.90&lt;/STRONG&gt; - -&lt;SPAN&gt; [&lt;/SPAN&gt;13/Apr/2023:18:27:12.290&lt;SPAN&gt; +&lt;/SPAN&gt;0000&lt;SPAN&gt;] "&lt;/SPAN&gt;POST &lt;SPAN class=""&gt;/services/broker/phonehome/connection&lt;/SPAN&gt;_10.16.36.90_8089_usseacwsrv190.us.xyz.com_&lt;STRONG&gt;usseacwsrv190&lt;/STRONG&gt;_4D304A0A-05E2-483B-B2B5-7CF8A8928B7A HTTP/1.1&lt;SPAN&gt;" &lt;/SPAN&gt;200 24&lt;SPAN&gt; "&lt;/SPAN&gt;-&lt;SPAN&gt;" "&lt;/SPAN&gt;&lt;STRONG&gt;Splunk/8.2.7&lt;/STRONG&gt;&lt;SPAN&gt; (&lt;/SPAN&gt;&lt;STRONG&gt;Windows Server 10 Datacenter Edition&lt;/STRONG&gt;&lt;SPAN&gt;; &lt;/SPAN&gt;arch=x64&lt;SPAN&gt;)" &lt;/SPAN&gt;- 2ms&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN class=""&gt;Hi Everyone&amp;nbsp;&lt;BR /&gt;Please help me with the regex to extract the following fields highlighted in bold.&lt;/SPAN&gt;&lt;/P&gt;</description>
    <pubDate>Thu, 13 Apr 2023 18:38:58 GMT</pubDate>
    <dc:creator>kell_cena</dc:creator>
    <dc:date>2023-04-13T18:38:58Z</dc:date>
    <item>
      <title>How to extract IP hostname SplunkAgent and Machine architecture from splunkd_access log?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-extract-IP-hostname-SplunkAgent-and-Machine-architecture/m-p/639860#M221727</link>
      <description>&lt;P&gt;&lt;STRONG&gt;&lt;SPAN class=""&gt;10.179.130.56&lt;/SPAN&gt;&lt;/STRONG&gt; &lt;SPAN class=""&gt;-&lt;/SPAN&gt; &lt;SPAN class=""&gt;-&lt;/SPAN&gt;&lt;SPAN&gt; [&lt;/SPAN&gt;&lt;SPAN class=""&gt;14/Apr/2023:01:59:28.233&lt;/SPAN&gt;&lt;SPAN&gt; +&lt;/SPAN&gt;&lt;SPAN class=""&gt;0800&lt;/SPAN&gt;&lt;SPAN&gt;] "&lt;/SPAN&gt;&lt;SPAN class=""&gt;POST&lt;/SPAN&gt; &lt;SPAN class=""&gt;&lt;SPAN class=""&gt;/services/broker/phonehome/connection&lt;/SPAN&gt;_10.179.130.56_8089_10.179.130.56_&lt;STRONG&gt;MYETKPWSQL002&lt;/STRONG&gt;_918B12BB-35AB-452A-BAEB-592395125496&lt;/SPAN&gt; &lt;SPAN class=""&gt;HTTP/1.1&lt;/SPAN&gt;&lt;SPAN&gt;" &lt;/SPAN&gt;&lt;SPAN class=""&gt;200&lt;/SPAN&gt; &lt;SPAN class=""&gt;530&lt;/SPAN&gt;&lt;SPAN&gt; "&lt;/SPAN&gt;&lt;SPAN class=""&gt;-&lt;/SPAN&gt;&lt;SPAN&gt;" "&lt;/SPAN&gt;&lt;STRONG&gt;&lt;SPAN class=""&gt;Splunk/8.2.7&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN&gt; (&lt;/SPAN&gt;&lt;STRONG&gt;&lt;SPAN class=""&gt;Windows&lt;/SPAN&gt; &lt;SPAN class=""&gt;Server&lt;/SPAN&gt; &lt;SPAN class=""&gt;10&lt;/SPAN&gt; &lt;SPAN class=""&gt;Standard&lt;/SPAN&gt; &lt;SPAN class=""&gt;Edition&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN&gt;; &lt;/SPAN&gt;&lt;SPAN class=""&gt;arch=x64&lt;/SPAN&gt;&lt;SPAN&gt;)" &lt;/SPAN&gt;&lt;SPAN class=""&gt;-&lt;/SPAN&gt; &lt;SPAN class=""&gt;1ms&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN class=""&gt;&lt;STRONG&gt;10.16.36.90&lt;/STRONG&gt; - -&lt;SPAN&gt; [&lt;/SPAN&gt;13/Apr/2023:18:27:12.290&lt;SPAN&gt; +&lt;/SPAN&gt;0000&lt;SPAN&gt;] "&lt;/SPAN&gt;POST &lt;SPAN class=""&gt;/services/broker/phonehome/connection&lt;/SPAN&gt;_10.16.36.90_8089_usseacwsrv190.us.xyz.com_&lt;STRONG&gt;usseacwsrv190&lt;/STRONG&gt;_4D304A0A-05E2-483B-B2B5-7CF8A8928B7A HTTP/1.1&lt;SPAN&gt;" &lt;/SPAN&gt;200 24&lt;SPAN&gt; "&lt;/SPAN&gt;-&lt;SPAN&gt;" "&lt;/SPAN&gt;&lt;STRONG&gt;Splunk/8.2.7&lt;/STRONG&gt;&lt;SPAN&gt; (&lt;/SPAN&gt;&lt;STRONG&gt;Windows Server 10 Datacenter Edition&lt;/STRONG&gt;&lt;SPAN&gt;; &lt;/SPAN&gt;arch=x64&lt;SPAN&gt;)" &lt;/SPAN&gt;- 2ms&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN class=""&gt;Hi Everyone&amp;nbsp;&lt;BR /&gt;Please help me with the regex to extract the following fields highlighted in bold.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 13 Apr 2023 18:38:58 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-extract-IP-hostname-SplunkAgent-and-Machine-architecture/m-p/639860#M221727</guid>
      <dc:creator>kell_cena</dc:creator>
      <dc:date>2023-04-13T18:38:58Z</dc:date>
    </item>
    <item>
      <title>How to extract IP hostname SplunkAgent and Machine architecture from splunkd_access log?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-extract-IP-hostname-SplunkAgent-and-Machine-architecture/m-p/639867#M221731</link>
      <description>&lt;P&gt;The following should work on both examples:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;| rex field=_raw "^(?&amp;lt;field1&amp;gt;(\d+\.?){4})[^"]+\"\w+\s(\/\w+)+([^_]+_){3}(?&amp;lt;field2&amp;gt;[^_]+).+(?&amp;lt;field3&amp;gt;Splunk[^\;]+);"&lt;/LI-CODE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 13 Apr 2023 18:57:03 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-extract-IP-hostname-SplunkAgent-and-Machine-architecture/m-p/639867#M221731</guid>
      <dc:creator>rut</dc:creator>
      <dc:date>2023-04-13T18:57:03Z</dc:date>
    </item>
    <item>
      <title>Re: How to extract IP hostname SplunkAgent and Machine architecture from splunkd_access log?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-extract-IP-hostname-SplunkAgent-and-Machine-architecture/m-p/639898#M221739</link>
      <description>&lt;P&gt;| makeresults&lt;BR /&gt;| eval _raw="10.179.130.56 - - [14/Apr/2023:01:59:28.233 +0800] \"POST /services/broker/phonehome/connection_10.179.130.56_8089_10.179.130.56_MYETKPWSQL002_918B12BB-35AB-452A-BAEB-592395125496 HTTP/1.1\" 200 530 \"-\" \"Splunk/8.2.7 (Windows Server 10 Standard Edition; arch=x64)\" - 1ms"&lt;BR /&gt;| rex "(?&amp;lt;src&amp;gt;\S+)\s*(?&amp;lt;foo&amp;gt;\S+)\s*(?&amp;lt;bar&amp;gt;\S+)\s+\[(?&amp;lt;timestamp&amp;gt;[^\]]+)\]\s+\"(?&amp;lt;request&amp;gt;[^\"]+)\"\s+(?&amp;lt;http_response_code&amp;gt;\d+)\s*(?&amp;lt;other_code&amp;gt;\d+)\s+\"(?&amp;lt;bat&amp;gt;[^\"]+)\"\s+\"(?&amp;lt;spunk_agent&amp;gt;\S+)\s+(?&amp;lt;architecture&amp;gt;[^\"]+)\"\s+(?&amp;lt;boo&amp;gt;\S+)\s+(?&amp;lt;response_time&amp;gt;\S+)"&lt;/P&gt;</description>
      <pubDate>Fri, 14 Apr 2023 01:29:28 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-extract-IP-hostname-SplunkAgent-and-Machine-architecture/m-p/639898#M221739</guid>
      <dc:creator>woodcock</dc:creator>
      <dc:date>2023-04-14T01:29:28Z</dc:date>
    </item>
  </channel>
</rss>

