<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: extracting multiple values for a field from one row(one event) in Splunk Search</title>
    <link>https://community.splunk.com/t5/Splunk-Search/extracting-multiple-values-for-a-field-from-one-row-one-event/m-p/34151#M7331</link>
    <description>&lt;P&gt;i have multiple values for the same field in an event line... and only the first value is read by splunk.. why is it so?&lt;/P&gt;</description>
    <pubDate>Mon, 26 Nov 2012 04:56:52 GMT</pubDate>
    <dc:creator>smolcj</dc:creator>
    <dc:date>2012-11-26T04:56:52Z</dc:date>
    <item>
      <title>extracting multiple values for a field from one row(one event)</title>
      <link>https://community.splunk.com/t5/Splunk-Search/extracting-multiple-values-for-a-field-from-one-row-one-event/m-p/34129#M7309</link>
      <description>&lt;P&gt;Hi all,&lt;BR /&gt;
 Regex is troubling me when i have to extract a field compared with previous line. My log is like&lt;/P&gt;

&lt;P&gt;Thread Event1 blablabla [something]....completed.&lt;BR /&gt;
       idletime:45.56&lt;BR /&gt;
Thread Event2 blablabla [something]....completed.no ststistics&lt;BR /&gt;
Thread Event3 blablabla [something]....completed.no ststistics&lt;BR /&gt;
Thread Event4 blablabla [something]....completed.no ststistics&lt;BR /&gt;
Thread Event5 blablabla [something]....completed.&lt;BR /&gt;
       idletime:45.56&lt;/P&gt;

&lt;P&gt;how to extract those idle time related with Event1? i have extracted the evantnames as field, but i am not getting any idea to continue the search with a regex.. please help..&lt;BR /&gt;
Thank you for your time &lt;/P&gt;

&lt;H2&gt;Question edited&lt;/H2&gt;

&lt;P&gt;i am sorry that i am confusing you people.. i will try to be more precise about my question.&lt;BR /&gt;
1.timestamp : [threadname] : threadid :logdetails&lt;BR /&gt;
2.timestamp : [threadname] : threadid &lt;BR /&gt;
...........log summary............ &lt;BR /&gt;
Thread &lt;STRONG&gt;&lt;EM&gt;Event1&lt;/EM&gt;&lt;/STRONG&gt; blablabla [&lt;STRONG&gt;&lt;EM&gt;something&lt;/EM&gt;&lt;/STRONG&gt;]....completed.no ststistics&lt;BR /&gt;
Thread &lt;STRONG&gt;Event2&lt;/STRONG&gt; blablabla [&lt;STRONG&gt;something&lt;/STRONG&gt;]....completed.&lt;BR /&gt;
    idletime:33&lt;BR /&gt;
    busytime:88&lt;BR /&gt;
Thread &lt;STRONG&gt;Event3&lt;/STRONG&gt; blablabla [&lt;STRONG&gt;something&lt;/STRONG&gt;]....completed.no ststistics&lt;BR /&gt;
Thread &lt;STRONG&gt;Event4&lt;/STRONG&gt; blablabla [&lt;STRONG&gt;something&lt;/STRONG&gt;]....completed.&lt;BR /&gt;
    idletime:55&lt;BR /&gt;
    busytime:99&lt;BR /&gt;
3.timestamp : [threadname] : threadid :logdetails&lt;BR /&gt;
4.timestamp : [threadname] : threadid :logdetails&lt;/P&gt;

&lt;P&gt;so issue here is, splunk reads only the first field that is it will read the italicized inputs, but i need it to read all the data in BOLD. i know that this issue is because &lt;STRONG&gt;splunk extract only the first value from a line and ignores the repeated ones and here all these information comes under one event and because of that splunk is ignoring the repeated values&lt;/STRONG&gt; &lt;BR /&gt;
so now please help me to solve this issue&lt;BR /&gt;
thank you&lt;/P&gt;</description>
      <pubDate>Wed, 14 Nov 2012 12:26:16 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/extracting-multiple-values-for-a-field-from-one-row-one-event/m-p/34129#M7309</guid>
      <dc:creator>smolcj</dc:creator>
      <dc:date>2012-11-14T12:26:16Z</dc:date>
    </item>
    <item>
      <title>Re: extracting multiple values for a field from one row(one event)</title>
      <link>https://community.splunk.com/t5/Splunk-Search/extracting-multiple-values-for-a-field-from-one-row-one-event/m-p/34130#M7310</link>
      <description>&lt;P&gt;You can make the regex multiline-capable by adding the flag (?m) at the beginning.&lt;/P&gt;</description>
      <pubDate>Wed, 14 Nov 2012 12:48:38 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/extracting-multiple-values-for-a-field-from-one-row-one-event/m-p/34130#M7310</guid>
      <dc:creator>martin_mueller</dc:creator>
      <dc:date>2012-11-14T12:48:38Z</dc:date>
    </item>
    <item>
      <title>Re: extracting multiple values for a field from one row(one event)</title>
      <link>https://community.splunk.com/t5/Splunk-Search/extracting-multiple-values-for-a-field-from-one-row-one-event/m-p/34131#M7311</link>
      <description>&lt;P&gt;All these logs come under one event, so even if i use (?m) only the first event name is extracting&lt;/P&gt;</description>
      <pubDate>Wed, 14 Nov 2012 13:00:02 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/extracting-multiple-values-for-a-field-from-one-row-one-event/m-p/34131#M7311</guid>
      <dc:creator>smolcj</dc:creator>
      <dc:date>2012-11-14T13:00:02Z</dc:date>
    </item>
    <item>
      <title>Re: extracting multiple values for a field from one row(one event)</title>
      <link>https://community.splunk.com/t5/Splunk-Search/extracting-multiple-values-for-a-field-from-one-row-one-event/m-p/34132#M7312</link>
      <description>&lt;P&gt;That's because you configured your extraction incorrectly. Where and how have you configured the field extraction?&lt;/P&gt;</description>
      <pubDate>Wed, 14 Nov 2012 13:02:40 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/extracting-multiple-values-for-a-field-from-one-row-one-event/m-p/34132#M7312</guid>
      <dc:creator>Ayn</dc:creator>
      <dc:date>2012-11-14T13:02:40Z</dc:date>
    </item>
    <item>
      <title>Re: extracting multiple values for a field from one row(one event)</title>
      <link>https://community.splunk.com/t5/Splunk-Search/extracting-multiple-values-for-a-field-from-one-row-one-event/m-p/34133#M7313</link>
      <description>&lt;P&gt;You might be looking for multi-value fields then: &lt;A href="http://docs.splunk.com/Documentation/Splunk/latest/Knowledge/ConfigureSplunktoparsemulti-valuefields"&gt;http://docs.splunk.com/Documentation/Splunk/latest/Knowledge/ConfigureSplunktoparsemulti-valuefields&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 14 Nov 2012 13:04:14 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/extracting-multiple-values-for-a-field-from-one-row-one-event/m-p/34133#M7313</guid>
      <dc:creator>martin_mueller</dc:creator>
      <dc:date>2012-11-14T13:04:14Z</dc:date>
    </item>
    <item>
      <title>Re: extracting multiple values for a field from one row(one event)</title>
      <link>https://community.splunk.com/t5/Splunk-Search/extracting-multiple-values-for-a-field-from-one-row-one-event/m-p/34134#M7314</link>
      <description>&lt;P&gt;AYN, the log is defined so, these part of the log comes under some log summary.. so even if it come in next line, it is of same event details.&lt;/P&gt;</description>
      <pubDate>Wed, 14 Nov 2012 13:06:57 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/extracting-multiple-values-for-a-field-from-one-row-one-event/m-p/34134#M7314</guid>
      <dc:creator>smolcj</dc:creator>
      <dc:date>2012-11-14T13:06:57Z</dc:date>
    </item>
    <item>
      <title>Re: extracting multiple values for a field from one row(one event)</title>
      <link>https://community.splunk.com/t5/Splunk-Search/extracting-multiple-values-for-a-field-from-one-row-one-event/m-p/34135#M7315</link>
      <description>&lt;P&gt;@smolcj, So how does Splunk Break your event or is that one event defined by splunk.  I dont see a time stamp?&lt;/P&gt;</description>
      <pubDate>Wed, 14 Nov 2012 15:10:56 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/extracting-multiple-values-for-a-field-from-one-row-one-event/m-p/34135#M7315</guid>
      <dc:creator>bmacias84</dc:creator>
      <dc:date>2012-11-14T15:10:56Z</dc:date>
    </item>
    <item>
      <title>Re: extracting multiple values for a field from one row(one event)</title>
      <link>https://community.splunk.com/t5/Splunk-Search/extracting-multiple-values-for-a-field-from-one-row-one-event/m-p/34136#M7316</link>
      <description>&lt;P&gt;@smolcj&lt;/P&gt;

&lt;P&gt;Even if this is one single event and not being broken apart you should still be able to extract the idletime as a field. &lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;Thread\sEvent\d.*[\r\n]\s+Idletime\:(?&amp;lt;##myIdleTime&amp;gt;\d+\.\d{2})
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;(Please remove the hashes from the line above, the formatting on answers doesn't like angle brackets.)&lt;/P&gt;

&lt;P&gt;Splunk will look over multiple lines by default so you don't really have to set the (?m) flag.&lt;/P&gt;

&lt;P&gt;Based on your comments you are actually looking to extract multiple fields from the multiline event you provided. With that in mind, I have taken the event log snippet and highlighted everything that based on your original question and your comments are what you wish to extract as fields:&lt;/P&gt;

&lt;P&gt;Thread Event1 blablabla [something]....completed.&lt;BR /&gt;&lt;BR /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;idletime:&lt;STRONG&gt;45.56&lt;/STRONG&gt;&lt;BR /&gt;&lt;BR /&gt;
Thread &lt;STRONG&gt;Event2&lt;/STRONG&gt; blablabla [&lt;STRONG&gt;something&lt;/STRONG&gt;]....completed.no ststistics&lt;BR /&gt;&lt;BR /&gt;
Thread &lt;STRONG&gt;Event3&lt;/STRONG&gt; blablabla [&lt;STRONG&gt;something&lt;/STRONG&gt;]....completed.no ststistics&lt;BR /&gt;&lt;BR /&gt;
Thread &lt;STRONG&gt;Event4&lt;/STRONG&gt; blablabla [&lt;STRONG&gt;something&lt;/STRONG&gt;]....completed.no ststistics&lt;BR /&gt;&lt;BR /&gt;
Thread Event5 blablabla [something]....completed.&lt;BR /&gt;&lt;BR /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;idletime:&lt;STRONG&gt;45.56&lt;/STRONG&gt;&lt;/P&gt;

&lt;P&gt;The previous regex already extracts the idletime for you across multiple lines. Based on your regex in the comments;&lt;/P&gt;

&lt;P&gt;(?i)Threads(?P&amp;lt;fieldname1&amp;gt;[^s]+)sblablablas[(?P&amp;lt;fieldname2&amp;gt;[^]]+)]...completed.nosstatistics&lt;/P&gt;

&lt;P&gt;you would also like to extract another 2 fields. I am not sure if there were any typo's when you included that in your comments and the formatting rules made it a bit odd, but here is a corrected regex to match what you posted:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;Thread\s(?&amp;lt;##fieldname1&amp;gt;[^\s]+).*?\[(?&amp;lt;##fieldname2&amp;gt;[^\]]+)\]\.{4}completed.no\sststistics
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;Lastly if you want to change that last regex to get the event number and "something" then you may want to change the above regex to:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;Thread\s(?&amp;lt;##fieldname1&amp;gt;[^\s]+).*?\[(?&amp;lt;##fieldname2&amp;gt;[^\]]+)\]
&lt;/CODE&gt;&lt;/PRE&gt;</description>
      <pubDate>Wed, 14 Nov 2012 18:16:50 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/extracting-multiple-values-for-a-field-from-one-row-one-event/m-p/34136#M7316</guid>
      <dc:creator>Rob</dc:creator>
      <dc:date>2012-11-14T18:16:50Z</dc:date>
    </item>
    <item>
      <title>Re: extracting multiple values for a field from one row(one event)</title>
      <link>https://community.splunk.com/t5/Splunk-Search/extracting-multiple-values-for-a-field-from-one-row-one-event/m-p/34137#M7317</link>
      <description>&lt;P&gt;You can use the &amp;lt; character through explicitly typing the lt entity.&lt;/P&gt;</description>
      <pubDate>Wed, 14 Nov 2012 20:08:59 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/extracting-multiple-values-for-a-field-from-one-row-one-event/m-p/34137#M7317</guid>
      <dc:creator>martin_mueller</dc:creator>
      <dc:date>2012-11-14T20:08:59Z</dc:date>
    </item>
    <item>
      <title>Re: extracting multiple values for a field from one row(one event)</title>
      <link>https://community.splunk.com/t5/Splunk-Search/extracting-multiple-values-for-a-field-from-one-row-one-event/m-p/34138#M7318</link>
      <description>&lt;P&gt;The real issue is splunk reads only the first occurence of the event1 the second line is not reading as because it is in same event, how can i extract all the events?&lt;BR /&gt;
please help&lt;/P&gt;</description>
      <pubDate>Thu, 15 Nov 2012 12:34:01 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/extracting-multiple-values-for-a-field-from-one-row-one-event/m-p/34138#M7318</guid>
      <dc:creator>smolcj</dc:creator>
      <dc:date>2012-11-15T12:34:01Z</dc:date>
    </item>
    <item>
      <title>Re: extracting multiple values for a field from one row(one event)</title>
      <link>https://community.splunk.com/t5/Splunk-Search/extracting-multiple-values-for-a-field-from-one-row-one-event/m-p/34139#M7319</link>
      <description>&lt;P&gt;yes it have a time stamp&lt;BR /&gt;
log is like&lt;BR /&gt;
timestamp severity processid Event1 bla blalog info&lt;BR /&gt;
******** log statistics*******&lt;BR /&gt;
Thread Event1 blablabla [something]....completed.&lt;BR /&gt;
       idletime:45.56&lt;BR /&gt;
Thread Event2 blablabla [something]....completed.no ststistics&lt;BR /&gt;
Thread Event3 blablabla [something]....completed.no ststistics&lt;BR /&gt;
Thread Event4 blablabla [something]....completed.&lt;BR /&gt;
       idletime:45.56&lt;BR /&gt;
timestamp severity processid Event1 bla blalog info&lt;BR /&gt;
timestamp severity processid Event1 bla blalog info&lt;BR /&gt;
timestamp severity processid Event1 bla blalog info&lt;/P&gt;</description>
      <pubDate>Thu, 15 Nov 2012 12:39:03 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/extracting-multiple-values-for-a-field-from-one-row-one-event/m-p/34139#M7319</guid>
      <dc:creator>smolcj</dc:creator>
      <dc:date>2012-11-15T12:39:03Z</dc:date>
    </item>
    <item>
      <title>Re: extracting multiple values for a field from one row(one event)</title>
      <link>https://community.splunk.com/t5/Splunk-Search/extracting-multiple-values-for-a-field-from-one-row-one-event/m-p/34140#M7320</link>
      <description>&lt;P&gt;Well like I previously asked, how are you currently extracting it?&lt;/P&gt;</description>
      <pubDate>Thu, 15 Nov 2012 12:39:33 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/extracting-multiple-values-for-a-field-from-one-row-one-event/m-p/34140#M7320</guid>
      <dc:creator>Ayn</dc:creator>
      <dc:date>2012-11-15T12:39:33Z</dc:date>
    </item>
    <item>
      <title>Re: extracting multiple values for a field from one row(one event)</title>
      <link>https://community.splunk.com/t5/Splunk-Search/extracting-multiple-values-for-a-field-from-one-row-one-event/m-p/34141#M7321</link>
      <description>&lt;P&gt;i am extracting "Event" and something as 2 separate fields&lt;BR /&gt;
regex is like (?i)Thread\s(?P&lt;FIELDNAME1&gt;[^\s]+)\sblablabla\s[(?P&lt;FIELDNAME2&gt;[^]]+)]...completed.no\sstatistics&lt;BR /&gt;
like this i am trying to extract 2 fields but only the first occurrence is extracting. shall i use TOKENIZER but i guess it is for separating same field elements.. i have already a field named event  and it is extracting correctly bot not these thread fields&lt;/FIELDNAME2&gt;&lt;/FIELDNAME1&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 15 Nov 2012 12:48:36 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/extracting-multiple-values-for-a-field-from-one-row-one-event/m-p/34141#M7321</guid>
      <dc:creator>smolcj</dc:creator>
      <dc:date>2012-11-15T12:48:36Z</dc:date>
    </item>
    <item>
      <title>Re: extracting multiple values for a field from one row(one event)</title>
      <link>https://community.splunk.com/t5/Splunk-Search/extracting-multiple-values-for-a-field-from-one-row-one-event/m-p/34142#M7322</link>
      <description>&lt;P&gt;the regex i extracted is working fine in &lt;A href="http://gskinner.com/RegExr/"&gt;http://gskinner.com/RegExr/&lt;/A&gt;&lt;/P&gt;

&lt;P&gt;somebody please tell me how to extract multivalue from same line or event(in splunk language)..&lt;BR /&gt;
another issue is enabling or disabling something in general will make my some other extractions in trouble.. so suggest something which i can use only for this particular field&lt;BR /&gt;
thank you&lt;/P&gt;</description>
      <pubDate>Thu, 15 Nov 2012 13:12:35 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/extracting-multiple-values-for-a-field-from-one-row-one-event/m-p/34142#M7322</guid>
      <dc:creator>smolcj</dc:creator>
      <dc:date>2012-11-15T13:12:35Z</dc:date>
    </item>
    <item>
      <title>Re: extracting multiple values for a field from one row(one event)</title>
      <link>https://community.splunk.com/t5/Splunk-Search/extracting-multiple-values-for-a-field-from-one-row-one-event/m-p/34143#M7323</link>
      <description>&lt;P&gt;regExr is to create regular expression . from what u mentioned, the problem is with breakdown of events. did u define it precisely while creating sourcetype or uploading datainputs?&lt;/P&gt;</description>
      <pubDate>Thu, 15 Nov 2012 13:22:52 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/extracting-multiple-values-for-a-field-from-one-row-one-event/m-p/34143#M7323</guid>
      <dc:creator>sruthy</dc:creator>
      <dc:date>2012-11-15T13:22:52Z</dc:date>
    </item>
    <item>
      <title>Re: extracting multiple values for a field from one row(one event)</title>
      <link>https://community.splunk.com/t5/Splunk-Search/extracting-multiple-values-for-a-field-from-one-row-one-event/m-p/34144#M7324</link>
      <description>&lt;P&gt;yes, it is fine.. these lines comes under an even. but i have to extract it and show separately as a table..&lt;BR /&gt;
thank you&lt;/P&gt;</description>
      <pubDate>Thu, 15 Nov 2012 13:24:32 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/extracting-multiple-values-for-a-field-from-one-row-one-event/m-p/34144#M7324</guid>
      <dc:creator>smolcj</dc:creator>
      <dc:date>2012-11-15T13:24:32Z</dc:date>
    </item>
    <item>
      <title>Re: extracting multiple values for a field from one row(one event)</title>
      <link>https://community.splunk.com/t5/Splunk-Search/extracting-multiple-values-for-a-field-from-one-row-one-event/m-p/34145#M7325</link>
      <description>&lt;P&gt;@martin_mueller: I did try that but it still formats the string badly. &lt;span class="lia-unicode-emoji" title=":disappointed_face:"&gt;😞&lt;/span&gt;&lt;/P&gt;

&lt;P&gt;@smolcj: The regex I provided earlier would have worked in splunk to give you the first value that you were looking for. I will update my answer to reflect the regex from your comments here.&lt;/P&gt;</description>
      <pubDate>Thu, 15 Nov 2012 19:06:46 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/extracting-multiple-values-for-a-field-from-one-row-one-event/m-p/34145#M7325</guid>
      <dc:creator>Rob</dc:creator>
      <dc:date>2012-11-15T19:06:46Z</dc:date>
    </item>
    <item>
      <title>Re: extracting multiple values for a field from one row(one event)</title>
      <link>https://community.splunk.com/t5/Splunk-Search/extracting-multiple-values-for-a-field-from-one-row-one-event/m-p/34146#M7326</link>
      <description>&lt;P&gt;what is the splunk property that ignores the multiple occurences of fieldvalues in splunk.. i think that is the reason for my issue&lt;BR /&gt;
anybody please help&lt;BR /&gt;
thank you&lt;/P&gt;</description>
      <pubDate>Wed, 21 Nov 2012 11:53:35 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/extracting-multiple-values-for-a-field-from-one-row-one-event/m-p/34146#M7326</guid>
      <dc:creator>smolcj</dc:creator>
      <dc:date>2012-11-21T11:53:35Z</dc:date>
    </item>
    <item>
      <title>Re: extracting multiple values for a field from one row(one event)</title>
      <link>https://community.splunk.com/t5/Splunk-Search/extracting-multiple-values-for-a-field-from-one-row-one-event/m-p/34147#M7327</link>
      <description>&lt;P&gt;Do i have to disable something to prevent ignoring multiple values from same event in splunk?&lt;/P&gt;</description>
      <pubDate>Wed, 21 Nov 2012 12:05:33 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/extracting-multiple-values-for-a-field-from-one-row-one-event/m-p/34147#M7327</guid>
      <dc:creator>smolcj</dc:creator>
      <dc:date>2012-11-21T12:05:33Z</dc:date>
    </item>
    <item>
      <title>Re: extracting multiple values for a field from one row(one event)</title>
      <link>https://community.splunk.com/t5/Splunk-Search/extracting-multiple-values-for-a-field-from-one-row-one-event/m-p/34148#M7328</link>
      <description>&lt;P&gt;@smolcj this is a bit off toppic from this question and you probably want to ask each of your questions separately so they do not get confusing.&lt;/P&gt;

&lt;P&gt;That said, the search command you are looking for is 'dedup'&lt;/P&gt;</description>
      <pubDate>Wed, 21 Nov 2012 18:25:51 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/extracting-multiple-values-for-a-field-from-one-row-one-event/m-p/34148#M7328</guid>
      <dc:creator>Rob</dc:creator>
      <dc:date>2012-11-21T18:25:51Z</dc:date>
    </item>
  </channel>
</rss>

