<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Use eval command to extract from message in Splunk Search</title>
    <link>https://community.splunk.com/t5/Splunk-Search/Use-eval-command-to-extract-from-message/m-p/679119#M232158</link>
    <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/264382"&gt;@jeradb&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;you could use a regex, not an eval command like the following:&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;| rex "User Name: (?&amp;lt;User_Name&amp;gt;[^ \n]+)"&lt;/LI-CODE&gt;&lt;P&gt;you can test this regex at&amp;nbsp;&lt;A href="https://regex101.com/r/gJ0I26/1" target="_blank"&gt;https://regex101.com/r/gJ0I26/1&lt;/A&gt;&lt;/P&gt;&lt;P&gt;But only one question: did you installed the Splunk_TA_Windows (&lt;A href="https://splunkbase.splunk.com/app/742" target="_blank"&gt;https://splunkbase.splunk.com/app/742&lt;/A&gt;)?&lt;/P&gt;&lt;P&gt;using this add-on you should already have this field extracted without using a custom regex.&lt;/P&gt;&lt;P&gt;Ciao.&lt;/P&gt;&lt;P&gt;Giuseppe&lt;/P&gt;</description>
    <pubDate>Thu, 29 Feb 2024 14:00:23 GMT</pubDate>
    <dc:creator>gcusello</dc:creator>
    <dc:date>2024-02-29T14:00:23Z</dc:date>
    <item>
      <title>Use eval command to extract from message</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Use-eval-command-to-extract-from-message/m-p/679118#M232157</link>
      <description>&lt;LI-CODE lang="markup"&gt;LogName=Application
EventCode=1004
EventType=4
ComputerName=Test.local
User=NOT_TRANSLATED
Sid=S-1-5-21-2704069758-3089908202-2921546158-1104
SidType=0
SourceName=RoxioBurn
Type=Information
RecordNumber=16834
Keywords=Classic
TaskCategory=Optical Disc
OpCode=Info
Message=Date: Wed Feb 28 14:22:59 2024
 Computer Name: COM-HV01
 User Name: Test\test.user
 Writing is completed on drive (E:). Project includes 0 folder(s) and 1 file(s).
 Volume Label: 2024-02-28 
 Volume SN: 0
 Volume ID: \??\Volume{b282bf1c-3dde-11ed-b48e-806e6f6e6963}
 Type: Unknown
 Status Of Media: Appendable,Blank,Closed session
 Files: C:\ProgramData\Roxio Log Files\Test.test.user_20240228142142.txt SHA1: 7c347a6724dcd243d396f9bb5e560142f26b8aa4
 File System: None
 Disc Number: 1
 Encryption: Yes
 User Password: Yes
 Spanned Set: No
 Data Size On Disc Set: 511 Bytes
 Network Volume: No&lt;/LI-CODE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;How would I write an eval command to extract User Name: without domain, Status of Media, Data size on disc set, and files from the field Message?&amp;nbsp;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 29 Feb 2024 13:49:48 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Use-eval-command-to-extract-from-message/m-p/679118#M232157</guid>
      <dc:creator>jeradb</dc:creator>
      <dc:date>2024-02-29T13:49:48Z</dc:date>
    </item>
    <item>
      <title>Re: Use eval command to extract from message</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Use-eval-command-to-extract-from-message/m-p/679119#M232158</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/264382"&gt;@jeradb&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;you could use a regex, not an eval command like the following:&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;| rex "User Name: (?&amp;lt;User_Name&amp;gt;[^ \n]+)"&lt;/LI-CODE&gt;&lt;P&gt;you can test this regex at&amp;nbsp;&lt;A href="https://regex101.com/r/gJ0I26/1" target="_blank"&gt;https://regex101.com/r/gJ0I26/1&lt;/A&gt;&lt;/P&gt;&lt;P&gt;But only one question: did you installed the Splunk_TA_Windows (&lt;A href="https://splunkbase.splunk.com/app/742" target="_blank"&gt;https://splunkbase.splunk.com/app/742&lt;/A&gt;)?&lt;/P&gt;&lt;P&gt;using this add-on you should already have this field extracted without using a custom regex.&lt;/P&gt;&lt;P&gt;Ciao.&lt;/P&gt;&lt;P&gt;Giuseppe&lt;/P&gt;</description>
      <pubDate>Thu, 29 Feb 2024 14:00:23 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Use-eval-command-to-extract-from-message/m-p/679119#M232158</guid>
      <dc:creator>gcusello</dc:creator>
      <dc:date>2024-02-29T14:00:23Z</dc:date>
    </item>
    <item>
      <title>Re: Use eval command to extract from message</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Use-eval-command-to-extract-from-message/m-p/679731#M232366</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/264382"&gt;@jeradb&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;good for you, see next time!&lt;/P&gt;&lt;P&gt;Ciao and happy splunking&lt;/P&gt;&lt;P&gt;Giuseppe&lt;/P&gt;&lt;P&gt;P.S.: Karma Points are appreciated &lt;span class="lia-unicode-emoji" title=":winking_face:"&gt;😉&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 06 Mar 2024 07:31:33 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Use-eval-command-to-extract-from-message/m-p/679731#M232366</guid>
      <dc:creator>gcusello</dc:creator>
      <dc:date>2024-03-06T07:31:33Z</dc:date>
    </item>
  </channel>
</rss>

