<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Need help with field extraction in search time in Splunk Search</title>
    <link>https://community.splunk.com/t5/Splunk-Search/Need-help-with-field-extraction-in-search-time/m-p/693524#M235955</link>
    <description>&lt;P&gt;The .* does not match newline etc, so here is a trick I did find.&amp;nbsp; Change&amp;nbsp;&lt;STRONG&gt;.*&lt;/STRONG&gt; with&amp;nbsp;&lt;STRONG&gt;[\s\S]*&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;example:&lt;BR /&gt;&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;\&amp;lt;ReportItem\s(?&amp;lt;pluginout&amp;gt;[\s\S]*?)\&amp;lt;\/ReportItem\&amp;gt;&lt;/LI-CODE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Tue, 16 Jul 2024 19:28:23 GMT</pubDate>
    <dc:creator>jotne</dc:creator>
    <dc:date>2024-07-16T19:28:23Z</dc:date>
    <item>
      <title>Need help with field extraction in search time</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Need-help-with-field-extraction-in-search-time/m-p/693413#M235930</link>
      <description>&lt;P&gt;I have a raw Nessus file that I've processed by separating host names into individual hosts. However, I am encountering a problem with extracting data between &amp;lt;ReportItem&amp;gt; tags, especially when there are multiple lines involved (I have multiple report Items in one event under a hostname) .&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Here is the regular expression I am using:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;LI-CODE lang="markup"&gt;| rex field=_raw max_match=0 "\&amp;lt;ReportItem\s(?&amp;lt;pluginout&amp;gt;.*?)\&amp;lt;\/ReportItem\&amp;gt;"
OR
| rex field=_raw max_match=0 "\&amp;lt;ReportItem\s(?&amp;lt;pluginout&amp;gt;.*(\s+)?)\&amp;lt;\/ReportItem\&amp;gt;"&lt;/LI-CODE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Unfortunately, it doesn't seem to capture anything that spans multiple lines, as shown in the example below:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;"&amp;lt;ReportItem&amp;gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; ...&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; (multiline content)&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; ...&lt;/P&gt;
&lt;P&gt;&amp;lt;/ReportItem&amp;gt;"&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Could you please help me adjust my regular expression to correctly capture multiline content within &amp;lt;ReportItem?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Note: ReportItem without multi lines are extracting fine.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;any help would be appreciated&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 16 Jul 2024 21:57:42 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Need-help-with-field-extraction-in-search-time/m-p/693413#M235930</guid>
      <dc:creator>satyaallaparthi</dc:creator>
      <dc:date>2024-07-16T21:57:42Z</dc:date>
    </item>
    <item>
      <title>Re: Need help with field extraction in search time</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Need-help-with-field-extraction-in-search-time/m-p/693416#M235931</link>
      <description>&lt;P&gt;Your illustrated fragment suggests that your raw events are either XML or contains XML documents. &amp;nbsp;I strongly discourage treating structured data such as XML as plain text. &amp;nbsp;Please post complete sample event. (Anonymize as needed.)&lt;/P&gt;</description>
      <pubDate>Tue, 16 Jul 2024 04:00:09 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Need-help-with-field-extraction-in-search-time/m-p/693416#M235931</guid>
      <dc:creator>yuanliu</dc:creator>
      <dc:date>2024-07-16T04:00:09Z</dc:date>
    </item>
    <item>
      <title>Re: Need help with field extraction in search time</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Need-help-with-field-extraction-in-search-time/m-p/693425#M235932</link>
      <description>&lt;LI-CODE lang="markup"&gt;| rex field=_raw max_match=0 "(?s)\&amp;lt;ReportItem&amp;gt;(?&amp;lt;pluginout&amp;gt;.*?)\&amp;lt;\/ReportItem\&amp;gt;"&lt;/LI-CODE&gt;&lt;P&gt;Having offered that,&amp;nbsp;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/33901"&gt;@yuanliu&lt;/a&gt;&amp;nbsp;is correct, it is usually better to treat structured data with correct tools e.g. spath, However, without a complete representation of your event data, and a fuller understanding of what it is you are actually trying to achieve, the rex above meets your minimal needs.&lt;/P&gt;</description>
      <pubDate>Tue, 16 Jul 2024 05:54:09 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Need-help-with-field-extraction-in-search-time/m-p/693425#M235932</guid>
      <dc:creator>ITWhisperer</dc:creator>
      <dc:date>2024-07-16T05:54:09Z</dc:date>
    </item>
    <item>
      <title>Re: Need help with field extraction in search time</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Need-help-with-field-extraction-in-search-time/m-p/693507#M235947</link>
      <description>&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;&lt;/LI-CODE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 12 Sep 2024 18:48:05 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Need-help-with-field-extraction-in-search-time/m-p/693507#M235947</guid>
      <dc:creator>satyaallaparthi</dc:creator>
      <dc:date>2024-09-12T18:48:05Z</dc:date>
    </item>
    <item>
      <title>Re: Need help with field extraction in search time</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Need-help-with-field-extraction-in-search-time/m-p/693508#M235948</link>
      <description>&lt;P&gt;I have &amp;nbsp;inserted the raw log in the xml code editor. One without new lines in it are extracting fine but not the ones with new lines or tabs are not even though I am using (?s)&lt;/P&gt;</description>
      <pubDate>Tue, 16 Jul 2024 15:40:32 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Need-help-with-field-extraction-in-search-time/m-p/693508#M235948</guid>
      <dc:creator>satyaallaparthi</dc:creator>
      <dc:date>2024-07-16T15:40:32Z</dc:date>
    </item>
    <item>
      <title>Re: Need help with field extraction in search time</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Need-help-with-field-extraction-in-search-time/m-p/693524#M235955</link>
      <description>&lt;P&gt;The .* does not match newline etc, so here is a trick I did find.&amp;nbsp; Change&amp;nbsp;&lt;STRONG&gt;.*&lt;/STRONG&gt; with&amp;nbsp;&lt;STRONG&gt;[\s\S]*&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;example:&lt;BR /&gt;&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;\&amp;lt;ReportItem\s(?&amp;lt;pluginout&amp;gt;[\s\S]*?)\&amp;lt;\/ReportItem\&amp;gt;&lt;/LI-CODE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 16 Jul 2024 19:28:23 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Need-help-with-field-extraction-in-search-time/m-p/693524#M235955</guid>
      <dc:creator>jotne</dc:creator>
      <dc:date>2024-07-16T19:28:23Z</dc:date>
    </item>
    <item>
      <title>Re: Need help with field extraction in search time</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Need-help-with-field-extraction-in-search-time/m-p/693529#M235958</link>
      <description>&lt;P&gt;Thank you for sharing complete event. &amp;nbsp;If this is raw event, all you need is &lt;A href="https://docs.splunk.com/Documentation/Splunk/latest/SearchReference/Spath" target="_blank" rel="noopener"&gt;spath&lt;/A&gt;&amp;nbsp;(or &lt;A href="https://docs.splunk.com/Documentation/Splunk/latest/SearchReference/Xmlkv" target="_blank" rel="noopener"&gt;xmlkv&lt;/A&gt;, which has some interesting restrictions). &amp;nbsp;For example,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;&amp;lt;your search&amp;gt;
| spath&lt;/LI-CODE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;These commands are QA tested by Splunk, much more robust than anything you can develop. (It also has the added benefit of getting richer data extracted.)&lt;/P&gt;&lt;P&gt;Here is a complete emulation. &amp;nbsp;Play with it and compare with real data.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;| makeresults
| eval _raw = "&amp;lt;/HostProperties&amp;gt;&amp;lt;ReportItem severity=\"0\" port=\"0\" pluginFamily=\"Ubuntu Local Security Checks\" pluginName=\"Ubuntu 18.04 ESM / 20.04 LTS / 22.04 LTS : Vim vulnerabilities (USN-6420-1)\" pluginID=\"182769\" protocol=\"tcp\" &amp;lt;cvss_vector&amp;gt;AV:N/AC:L/Au:N/C:C/I:C/A:C&amp;lt;/cvss_vector&amp;gt;&amp;lt;description&amp;gt;The remote Ubuntu 18.04 ESM / 20.04 LTS / 22.04 LTS host has packages installed that are affected by multiple vulnerabilities as referenced in the USN-6420-1 advisory.

  - Heap-based Buffer Overflow in GitHub repository vim/vim prior to 9.0.0483. (CVE-2022-3234)

  - Use After Free in GitHub repository vim/vim prior to 9.0.0490. (CVE-2022-3235)

  - Use After Free in GitHub repository vim/vim prior to 9.0.0530. (CVE-2022-3256)

  - NULL Pointer Dereference in GitHub repository vim/vim prior to 9.0.0552. (CVE-2022-3278)

  - Use After Free in GitHub repository vim/vim prior to 9.0.0579. (CVE-2022-3297)

  - Stack-based Buffer Overflow in GitHub repository vim/vim prior to 9.0.0598. (CVE-2022-3324)

  - Use After Free in GitHub repository vim/vim prior to 9.0.0614. (CVE-2022-3352)

  - Heap-based Buffer Overflow in GitHub repository vim/vim prior to 9.0.0742. (CVE-2022-3491)

  - Heap-based Buffer Overflow in GitHub repository vim/vim prior to 9.0.0765. (CVE-2022-3520)

  - Use After Free in GitHub repository vim/vim prior to 9.0.0789. (CVE-2022-3591)

  - A vulnerability was found in vim and classified as problematic. Affected by this issue is the function     qf_update_buffer of the file quickfix.c of the component autocmd Handler. The manipulation leads to use     after free. The attack may be launched remotely. Upgrading to version 9.0.0805 is able to address this     issue. The name of the patch is. It is recommended to upgrade the affected component. The identifier of this vulnerability is VDB-212324. (CVE-2022-3705)

  - Use After Free in GitHub repository vim/vim prior to 9.0.0882. (CVE-2022-4292)

  - Floating Point Comparison with Incorrect Operator in GitHub repository vim/vim prior to 9.0.0804.
    (CVE-2022-4293)

Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.&amp;lt;/description&amp;gt;&amp;lt;synopsis&amp;gt;The remote Ubuntu host is missing one or more security updates.&amp;lt;plugin_output&amp;gt;
  - Installed package : vim_2:8.1.2269-1ubuntu5.17
  - Fixed package     : vim_2:8.1.2269-1ubuntu5.18

  - Installed package : vim-common_2:8.1.2269-1ubuntu5.17
  - Fixed package     : vim-common_2:8.1.2269-1ubuntu5.18

  - Installed package : vim-runtime_2:8.1.2269-1ubuntu5.17
  - Fixed package     : vim-runtime_2:8.1.2269-1ubuntu5.18

  - Installed package : vim-tiny_2:8.1.2269-1ubuntu5.17
  - Fixed package     : vim-tiny_2:8.1.2269-1ubuntu5.18

  - Installed package : xxd_2:8.1.2269-1ubuntu5.17
  - Fixed package     : xxd_2:8.1.2269-1ubuntu5.18

&amp;lt;/plugin_output&amp;gt;&amp;lt;/ReportItem&amp;gt;&amp;lt;ReportItem severity=\"0\" port=\"0\" pluginFamily=\"Ubuntu Local Security Checks\" pluginName=\"Ubuntu 16.04 ESM / 18.04 ESM / 20.04 LTS / 22.04 LTS / 23.04 : LibTIFF vulnerability (USN-6428-1)\" pluginID=\"182891\" protocol=\"tcp\" &amp;lt;description&amp;gt;The remote Ubuntu 16.04 ESM / 18.04 ESM / 20.04 LTS / 22.04 LTS / 23.04 host has packages installed that are affected by a vulnerability as referenced in the USN-6428-1 advisory.

  - A flaw was found in tiffcrop, a program distributed by the libtiff package. A specially crafted tiff file     can lead to an out-of-bounds read in the extractImageSection function in tools/tiffcrop.c, resulting in a     denial of service and limited information disclosure. This issue affects libtiff versions 4.x.
    (CVE-2023-1916)

Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.&amp;lt;/description&amp;gt;&amp;lt;synopsis&amp;gt;The remote Ubuntu host is missing a security update.&amp;lt;/synopsis&amp;gt;&amp;lt;cve&amp;gt;CVE-2023-1916&amp;lt;/cve&amp;gt;&amp;lt;xref&amp;gt;USN:6428-1&amp;lt;/xref&amp;gt;&amp;lt;see_also&amp;gt;https://ubuntu.com/security/notices/USN-6428-1&amp;lt;/see_also&amp;gt;&amp;lt;risk_factor&amp;gt;Medium&amp;lt;/risk_factor&amp;gt;&amp;lt;script_version&amp;gt;1.0&amp;lt;/script_version&amp;gt;&amp;lt;plugin_output&amp;gt;
  - Installed package : libtiff5_4.1.0+git191117-2ubuntu0.20.04.9
  - Fixed package     : libtiff5_4.1.0+git191117-2ubuntu0.20.04.10

&amp;lt;/plugin_output&amp;gt;&amp;lt;/ReportItem&amp;gt;&amp;lt;ReportItem severity=\"3\" port=\"0\" pluginFamily=\"Ubuntu Local Security Checks\" pluginName=\"Ubuntu 16.04 LTS / 18.04 LTS / 20.04 LTS / 22.04 LTS / 23.10 : GIFLIB vulnerabilities (USN-6824-1)\" pluginID=\"200257\" protocol=\"tcp\"&amp;lt;description&amp;gt;The remote Ubuntu 16.04 LTS / 18.04 LTS / 20.04 LTS / 22.04 LTS / 23.10 host has packages installed that are affected by multiple vulnerabilities as referenced in the USN-6824-1 advisory.&amp;lt;/plugin_output&amp;gt;&amp;lt;/ReportItem&amp;gt;"
``` data emulation above ```
| spath
| fields plugin_output&lt;/LI-CODE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;This is the output (for brevity, I discarded all other nodes in XML):&lt;/P&gt;&lt;TABLE&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TD&gt;plugin_output&lt;/TD&gt;&lt;TD&gt;_raw&lt;/TD&gt;&lt;TD&gt;_time&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;- Installed package : libtiff5_4.1.0+git191117-2ubuntu0.20.04.9 - Fixed package : libtiff5_4.1.0+git191117-2ubuntu0.20.04.10&lt;/TD&gt;&lt;TD&gt;&amp;lt;/HostProperties&amp;gt;&amp;lt;ReportItem severity="0" port="0" pluginFamily="Ubuntu Local Security Checks" pluginName="Ubuntu 18.04 ESM / 20.04 LTS / 22.04 LTS : Vim vulnerabilities (USN-6420-1)" pluginID="182769" protocol="tcp" &amp;lt;cvss_vector&amp;gt;AV:N/AC:L/Au:N/C:C/I:C/A:C&amp;lt;/cvss_vector&amp;gt;&amp;lt;description&amp;gt;The remote Ubuntu 18.04 ESM / 20.04 LTS / 22.04 LTS host has packages installed that are affected by multiple vulnerabilities as referenced in the USN-6420-1 advisory. - Heap-based Buffer Overflow in GitHub repository vim/vim prior to 9.0.0483. (CVE-2022-3234) - Use After Free in GitHub repository vim/vim prior to 9.0.0490. (CVE-2022-3235) - Use After Free in GitHub repository vim/vim prior to 9.0.0530. (CVE-2022-3256) - NULL Pointer Dereference in GitHub repository vim/vim prior to 9.0.0552. (CVE-2022-3278) - Use After Free in GitHub repository vim/vim prior to 9.0.0579. (CVE-2022-3297) - Stack-based Buffer Overflow in GitHub repository vim/vim prior to 9.0.0598. (CVE-2022-3324) - Use After Free in GitHub repository vim/vim prior to 9.0.0614. (CVE-2022-3352) - Heap-based Buffer Overflow in GitHub repository vim/vim prior to 9.0.0742. (CVE-2022-3491) - Heap-based Buffer Overflow in GitHub repository vim/vim prior to 9.0.0765. (CVE-2022-3520) - Use After Free in GitHub repository vim/vim prior to 9.0.0789. (CVE-2022-3591) - A vulnerability was found in vim and classified as problematic. Affected by this issue is the function qf_update_buffer of the file quickfix.c of the component autocmd Handler. The manipulation leads to use after free. The attack may be launched remotely. Upgrading to version 9.0.0805 is able to address this issue. The name of the patch is. It is recommended to upgrade the affected component. The identifier of this vulnerability is VDB-212324. (CVE-2022-3705) - Use After Free in GitHub repository vim/vim prior to 9.0.0882. (CVE-2022-4292) - Floating Point Comparison with Incorrect Operator in GitHub repository vim/vim prior to 9.0.0804. (CVE-2022-4293) Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.&amp;lt;/description&amp;gt;&amp;lt;synopsis&amp;gt;The remote Ubuntu host is missing one or more security updates.&amp;lt;plugin_output&amp;gt; - Installed package : vim_2:8.1.2269-1ubuntu5.17 - Fixed package : vim_2:8.1.2269-1ubuntu5.18 - Installed package : vim-common_2:8.1.2269-1ubuntu5.17 - Fixed package : vim-common_2:8.1.2269-1ubuntu5.18 - Installed package : vim-runtime_2:8.1.2269-1ubuntu5.17 - Fixed package : vim-runtime_2:8.1.2269-1ubuntu5.18 - Installed package : vim-tiny_2:8.1.2269-1ubuntu5.17 - Fixed package : vim-tiny_2:8.1.2269-1ubuntu5.18 - Installed package : xxd_2:8.1.2269-1ubuntu5.17 - Fixed package : xxd_2:8.1.2269-1ubuntu5.18 &amp;lt;/plugin_output&amp;gt;&amp;lt;/ReportItem&amp;gt;&amp;lt;ReportItem severity="0" port="0" pluginFamily="Ubuntu Local Security Checks" pluginName="Ubuntu 16.04 ESM / 18.04 ESM / 20.04 LTS / 22.04 LTS / 23.04 : LibTIFF vulnerability (USN-6428-1)" pluginID="182891" protocol="tcp" &amp;lt;description&amp;gt;The remote Ubuntu 16.04 ESM / 18.04 ESM / 20.04 LTS / 22.04 LTS / 23.04 host has packages installed that are affected by a vulnerability as referenced in the USN-6428-1 advisory. - A flaw was found in tiffcrop, a program distributed by the libtiff package. A specially crafted tiff file can lead to an out-of-bounds read in the extractImageSection function in tools/tiffcrop.c, resulting in a denial of service and limited information disclosure. This issue affects libtiff versions 4.x. (CVE-2023-1916) Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.&amp;lt;/description&amp;gt;&amp;lt;synopsis&amp;gt;The remote Ubuntu host is missing a security update.&amp;lt;/synopsis&amp;gt;&amp;lt;cve&amp;gt;CVE-2023-1916&amp;lt;/cve&amp;gt;&amp;lt;xref&amp;gt;USN:6428-1&amp;lt;/xref&amp;gt;&amp;lt;see_also&amp;gt;&lt;A href="https://ubuntu.com/security/notices/USN-6428-1" target="_blank" rel="noopener"&gt;https://ubuntu.com/security/notices/USN-6428-1&lt;/A&gt;&amp;lt;/see_also&amp;gt;&amp;lt;risk_factor&amp;gt;Medium&amp;lt;/risk_factor&amp;gt;&amp;lt;script_version&amp;gt;1.0&amp;lt;/script_version&amp;gt;&amp;lt;plugin_output&amp;gt; - Installed package : libtiff5_4.1.0+git191117-2ubuntu0.20.04.9 - Fixed package : libtiff5_4.1.0+git191117-2ubuntu0.20.04.10 &amp;lt;/plugin_output&amp;gt;&amp;lt;/ReportItem&amp;gt;&amp;lt;ReportItem severity="3" port="0" pluginFamily="Ubuntu Local Security Checks" pluginName="Ubuntu 16.04 LTS / 18.04 LTS / 20.04 LTS / 22.04 LTS / 23.10 : GIFLIB vulnerabilities (USN-6824-1)" pluginID="200257" protocol="tcp"&amp;lt;description&amp;gt;The remote Ubuntu 16.04 LTS / 18.04 LTS / 20.04 LTS / 22.04 LTS / 23.10 host has packages installed that are affected by multiple vulnerabilities as referenced in the USN-6824-1 advisory.&amp;lt;/plugin_output&amp;gt;&amp;lt;/ReportItem&amp;gt;&lt;/TD&gt;&lt;TD&gt;2024-07-16 14:52:11&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;</description>
      <pubDate>Tue, 16 Jul 2024 21:59:35 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Need-help-with-field-extraction-in-search-time/m-p/693529#M235958</guid>
      <dc:creator>yuanliu</dc:creator>
      <dc:date>2024-07-16T21:59:35Z</dc:date>
    </item>
    <item>
      <title>Re: Need help with field extraction in search time</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Need-help-with-field-extraction-in-search-time/m-p/693643#M235984</link>
      <description>&lt;P&gt;Actually, I forgot to mention in the main post.&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;&lt;P&gt;I tried “spath”, which is not extracting as expected (extracting other values for one field)&lt;/P&gt;</description>
      <pubDate>Wed, 17 Jul 2024 22:17:31 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Need-help-with-field-extraction-in-search-time/m-p/693643#M235984</guid>
      <dc:creator>satyaallaparthi</dc:creator>
      <dc:date>2024-07-17T22:17:31Z</dc:date>
    </item>
    <item>
      <title>Re: Need help with field extraction in search time</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Need-help-with-field-extraction-in-search-time/m-p/693657#M235985</link>
      <description>&lt;P&gt;The fragment you illustrated is NOT a complete XML document. &amp;nbsp;Please post full event. &amp;nbsp;My suspicion is that your raw event contains an XML document, but also contains something that is not XML. &amp;nbsp;You will need to first extract XML into a field, then apply spath.&lt;/P&gt;</description>
      <pubDate>Thu, 18 Jul 2024 04:55:32 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Need-help-with-field-extraction-in-search-time/m-p/693657#M235985</guid>
      <dc:creator>yuanliu</dc:creator>
      <dc:date>2024-07-18T04:55:32Z</dc:date>
    </item>
  </channel>
</rss>

