<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Extracting fields from Syslog event in Splunk Search</title>
    <link>https://community.splunk.com/t5/Splunk-Search/Extracting-fields-from-Syslog-event/m-p/309888#M92984</link>
    <description>&lt;P&gt;That kind of worked you can say. I can extract the port but for some reason none of my logs are on port 22 therefore I need to dig deeper&lt;/P&gt;</description>
    <pubDate>Fri, 07 Apr 2017 20:06:05 GMT</pubDate>
    <dc:creator>avalle</dc:creator>
    <dc:date>2017-04-07T20:06:05Z</dc:date>
    <item>
      <title>Extracting fields from Syslog event</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Extracting-fields-from-Syslog-event/m-p/309886#M92982</link>
      <description>&lt;P&gt;I have an alert set up to email me if I see failed log on to a list of servers. I would like to alter this alert to only email me if we see failed log on on port 22. The event has a port fiend that is not extracted but I have never extracted a field and I tried to extract it but I am not sure I am doing it right. I have also tried to add "AND "port 22"" to the  alert and that did not work&lt;/P&gt;

&lt;P&gt;This is the event:&lt;BR /&gt;
Jan  4 00:03:45 xxxxxxxxx.com sshd[26448]: [ID 800047 auth.notice] Failed keyboard-interactive for wcsuser from xxx.xxx.xxx.xxx port 56395 ssh2&lt;/P&gt;

&lt;P&gt;This is the alert I want to filter port 22:&lt;BR /&gt;
host=xxxdb* OR host=xxxod-* AND "ID 800047 auth.notice" | fields - index - linecount - source - sourcetype - splunk_server&lt;/P&gt;</description>
      <pubDate>Tue, 04 Apr 2017 16:30:31 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Extracting-fields-from-Syslog-event/m-p/309886#M92982</guid>
      <dc:creator>avalle</dc:creator>
      <dc:date>2017-04-04T16:30:31Z</dc:date>
    </item>
    <item>
      <title>Re: Extracting fields from Syslog event</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Extracting-fields-from-Syslog-event/m-p/309887#M92983</link>
      <description>&lt;P&gt;Try  this&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;host=xxxdb* OR host=xxxod-* AND "ID 800047 auth.notice" 
| rex port\s(?&amp;lt;port&amp;gt;\d+) 
| search port="22" 
| fields - index - linecount - source - sourcetype - splunk_server
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;This will extract the numbers from port then search on port 22&lt;/P&gt;</description>
      <pubDate>Tue, 04 Apr 2017 17:02:49 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Extracting-fields-from-Syslog-event/m-p/309887#M92983</guid>
      <dc:creator>skoelpin</dc:creator>
      <dc:date>2017-04-04T17:02:49Z</dc:date>
    </item>
    <item>
      <title>Re: Extracting fields from Syslog event</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Extracting-fields-from-Syslog-event/m-p/309888#M92984</link>
      <description>&lt;P&gt;That kind of worked you can say. I can extract the port but for some reason none of my logs are on port 22 therefore I need to dig deeper&lt;/P&gt;</description>
      <pubDate>Fri, 07 Apr 2017 20:06:05 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Extracting-fields-from-Syslog-event/m-p/309888#M92984</guid>
      <dc:creator>avalle</dc:creator>
      <dc:date>2017-04-07T20:06:05Z</dc:date>
    </item>
    <item>
      <title>Re: Extracting fields from Syslog event</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Extracting-fields-from-Syslog-event/m-p/309889#M92985</link>
      <description>&lt;P&gt;Add the info when you get it and I can help you solve your issue. If not, can you accept the answer and close out the question?&lt;/P&gt;</description>
      <pubDate>Fri, 07 Apr 2017 22:36:26 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Extracting-fields-from-Syslog-event/m-p/309889#M92985</guid>
      <dc:creator>skoelpin</dc:creator>
      <dc:date>2017-04-07T22:36:26Z</dc:date>
    </item>
  </channel>
</rss>

