<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Missing useragent field in Splunk Search</title>
    <link>https://community.splunk.com/t5/Splunk-Search/Missing-useragent-field/m-p/91624#M23621</link>
    <description>&lt;P&gt;You can use the | rex command or use the Interactive field extractor to extract your own field.&lt;BR /&gt;&lt;BR /&gt;
&lt;A href="http://docs.splunk.com/Documentation/Splunk/4.3.3/User/InteractiveFieldExtractionExample"&gt;http://docs.splunk.com/Documentation/Splunk/4.3.3/User/InteractiveFieldExtractionExample&lt;/A&gt;&lt;/P&gt;</description>
    <pubDate>Wed, 25 Jul 2012 15:13:17 GMT</pubDate>
    <dc:creator>rroberts</dc:creator>
    <dc:date>2012-07-25T15:13:17Z</dc:date>
    <item>
      <title>Missing useragent field</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Missing-useragent-field/m-p/91620#M23617</link>
      <description>&lt;P&gt;Hello Team,&lt;/P&gt;

&lt;P&gt;I want to extract the useragent information. Using apache server&lt;/P&gt;

&lt;P&gt;I added the data as apache logs, ISS. the data is formatted this way: &lt;BR /&gt;
66.249.xx.xx - - - [02/Jun/2012:04:02:12 -0400] "GET /robots.txt HTTP/1.1" 200 1792 "-" "Mozilla/5.0 (compatible; Googlebot/2.1; +&lt;A href="http://www.google.com/bot.html)"&gt;http://www.google.com/bot.html)&lt;/A&gt;"&lt;/P&gt;

&lt;P&gt;However, I've added a couple of files, and useragent is never listed in the field column.  I am interested in extracting these: Mozilla/5.0 (compatible; Googlebot/2.1)&lt;/P&gt;

&lt;P&gt;Any recommendations? &lt;/P&gt;</description>
      <pubDate>Thu, 05 Jul 2012 14:43:36 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Missing-useragent-field/m-p/91620#M23617</guid>
      <dc:creator>seekeo</dc:creator>
      <dc:date>2012-07-05T14:43:36Z</dc:date>
    </item>
    <item>
      <title>Re: Missing useragent field</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Missing-useragent-field/m-p/91621#M23618</link>
      <description>&lt;P&gt;There are several choices:&lt;BR /&gt;&lt;BR /&gt;
 1. Extract the field at search time with | rex command like so: source=/opt/log* | rex field=_raw "\"-\"\s+(?&lt;USERAGENT&gt;.+)"&lt;BR /&gt;&lt;BR /&gt;
 2. Use the interactive field extractor. See &lt;A href="http://docs.splunk.com/Documentation/Splunk/4.3.3/User/InteractiveFieldExtractionExample"&gt;http://docs.splunk.com/Documentation/Splunk/4.3.3/User/InteractiveFieldExtractionExample&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;
 3. Or use Splunk's Manager view to create an extracted field.&lt;/USERAGENT&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 05 Jul 2012 19:22:33 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Missing-useragent-field/m-p/91621#M23618</guid>
      <dc:creator>rroberts</dc:creator>
      <dc:date>2012-07-05T19:22:33Z</dc:date>
    </item>
    <item>
      <title>Re: Missing useragent field</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Missing-useragent-field/m-p/91622#M23619</link>
      <description>&lt;P&gt;Thanks for your answer.  &lt;/P&gt;

&lt;P&gt;But I just realized my logs files don't have the word useragent listed. &lt;/P&gt;

&lt;P&gt;How can I extract the Googlebot information instead? &lt;/P&gt;</description>
      <pubDate>Fri, 20 Jul 2012 15:15:34 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Missing-useragent-field/m-p/91622#M23619</guid>
      <dc:creator>seekeo</dc:creator>
      <dc:date>2012-07-20T15:15:34Z</dc:date>
    </item>
    <item>
      <title>Re: Missing useragent field</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Missing-useragent-field/m-p/91623#M23620</link>
      <description>&lt;P&gt;Your log files do not need to contain the name of the field. &lt;CODE&gt;useragent&lt;/CODE&gt; is the field name.&lt;/P&gt;

&lt;P&gt;If the logs are apache logs, you can set the sourcetype to &lt;CODE&gt;access_combined&lt;/CODE&gt; or &lt;CODE&gt;access_combined_wcookie&lt;/CODE&gt; in inputs.conf (or via the Splunk Manager GUI).  These sourcetypes are predefined in Splunk for apache logs; I think that &lt;CODE&gt;access_combined&lt;/CODE&gt; may be the right choice for your situation.&lt;/P&gt;

&lt;P&gt;When you use a predefined sourcetype, Splunk will automatically perform the field extractions that are defined for that sourcetype. The access_combined sourceytpe defines a field named &lt;CODE&gt;useragent&lt;/CODE&gt;.&lt;/P&gt;

&lt;P&gt;BTW, this change will only affect &lt;EM&gt;new&lt;/EM&gt; data that is added to Splunk. The data that has already been indexed will not change to the access_combined sourcetype.&lt;/P&gt;</description>
      <pubDate>Wed, 25 Jul 2012 02:37:16 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Missing-useragent-field/m-p/91623#M23620</guid>
      <dc:creator>lguinn2</dc:creator>
      <dc:date>2012-07-25T02:37:16Z</dc:date>
    </item>
    <item>
      <title>Re: Missing useragent field</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Missing-useragent-field/m-p/91624#M23621</link>
      <description>&lt;P&gt;You can use the | rex command or use the Interactive field extractor to extract your own field.&lt;BR /&gt;&lt;BR /&gt;
&lt;A href="http://docs.splunk.com/Documentation/Splunk/4.3.3/User/InteractiveFieldExtractionExample"&gt;http://docs.splunk.com/Documentation/Splunk/4.3.3/User/InteractiveFieldExtractionExample&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 25 Jul 2012 15:13:17 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Missing-useragent-field/m-p/91624#M23621</guid>
      <dc:creator>rroberts</dc:creator>
      <dc:date>2012-07-25T15:13:17Z</dc:date>
    </item>
    <item>
      <title>Re: Missing useragent field</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Missing-useragent-field/m-p/91625#M23622</link>
      <description>&lt;P&gt;Where in the Splunk Manager can I set  access_combined.  I am a non programmer and new to Splunk so am having difficulties setting up&lt;/P&gt;</description>
      <pubDate>Thu, 26 Jul 2012 14:39:16 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Missing-useragent-field/m-p/91625#M23622</guid>
      <dc:creator>seekeo</dc:creator>
      <dc:date>2012-07-26T14:39:16Z</dc:date>
    </item>
    <item>
      <title>Re: Missing useragent field</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Missing-useragent-field/m-p/91626#M23623</link>
      <description>&lt;P&gt;Lisa is ultimately correct with this answer. Correct source typing is the solution. You may want to consider attending Splunk training courses.&lt;/P&gt;</description>
      <pubDate>Mon, 30 Jul 2012 14:37:17 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Missing-useragent-field/m-p/91626#M23623</guid>
      <dc:creator>rroberts</dc:creator>
      <dc:date>2012-07-30T14:37:17Z</dc:date>
    </item>
  </channel>
</rss>

