<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Field Extraction and search in Splunk Search</title>
    <link>https://community.splunk.com/t5/Splunk-Search/Field-Extraction-and-search/m-p/314574#M94190</link>
    <description>&lt;P&gt;&lt;STRONG&gt;Here is the line in the log I am working with;&lt;/STRONG&gt;&lt;/P&gt;

&lt;P&gt;Message=COMPUTERNAME [Monday, April 02, 2018 7:15:53 AM (GMT-06:00)]: Status of device 'COMPUTER' changed to Critical: Many viruses detected.&lt;/P&gt;

&lt;P&gt;&lt;STRONG&gt;Goal;&lt;/STRONG&gt;&lt;BR /&gt;
I would like to search my database for all logs that have the status "Many viruses detected"&lt;/P&gt;

&lt;P&gt;I am newer to splunk, I need to use rex correct? I do not think the field has been extracted yet. &lt;/P&gt;

&lt;P&gt;After being able to find all the computers with this log, I would like to extract the field for future use.&lt;BR /&gt;
&lt;STRONG&gt;My search;&lt;/STRONG&gt;&lt;BR /&gt;
index=my_index | rex field=_raw"(?)Message=(?[a-zA-z0-9:\s[]\-,=`'."]\sMany\sviruses\sdetected"&lt;/P&gt;</description>
    <pubDate>Tue, 29 Sep 2020 18:53:07 GMT</pubDate>
    <dc:creator>cyler</dc:creator>
    <dc:date>2020-09-29T18:53:07Z</dc:date>
    <item>
      <title>Field Extraction and search</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Field-Extraction-and-search/m-p/314574#M94190</link>
      <description>&lt;P&gt;&lt;STRONG&gt;Here is the line in the log I am working with;&lt;/STRONG&gt;&lt;/P&gt;

&lt;P&gt;Message=COMPUTERNAME [Monday, April 02, 2018 7:15:53 AM (GMT-06:00)]: Status of device 'COMPUTER' changed to Critical: Many viruses detected.&lt;/P&gt;

&lt;P&gt;&lt;STRONG&gt;Goal;&lt;/STRONG&gt;&lt;BR /&gt;
I would like to search my database for all logs that have the status "Many viruses detected"&lt;/P&gt;

&lt;P&gt;I am newer to splunk, I need to use rex correct? I do not think the field has been extracted yet. &lt;/P&gt;

&lt;P&gt;After being able to find all the computers with this log, I would like to extract the field for future use.&lt;BR /&gt;
&lt;STRONG&gt;My search;&lt;/STRONG&gt;&lt;BR /&gt;
index=my_index | rex field=_raw"(?)Message=(?[a-zA-z0-9:\s[]\-,=`'."]\sMany\sviruses\sdetected"&lt;/P&gt;</description>
      <pubDate>Tue, 29 Sep 2020 18:53:07 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Field-Extraction-and-search/m-p/314574#M94190</guid>
      <dc:creator>cyler</dc:creator>
      <dc:date>2020-09-29T18:53:07Z</dc:date>
    </item>
    <item>
      <title>Re: Field Extraction and search</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Field-Extraction-and-search/m-p/314575#M94191</link>
      <description>&lt;P&gt;My search IS NOT working&lt;/P&gt;</description>
      <pubDate>Thu, 05 Apr 2018 15:37:40 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Field-Extraction-and-search/m-p/314575#M94191</guid>
      <dc:creator>cyler</dc:creator>
      <dc:date>2018-04-05T15:37:40Z</dc:date>
    </item>
    <item>
      <title>Re: Field Extraction and search</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Field-Extraction-and-search/m-p/314576#M94192</link>
      <description>&lt;P&gt;To return events with a specific string, just include that string in your base search.&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;index=my_index "Many viruses detected"
&lt;/CODE&gt;&lt;/PRE&gt;</description>
      <pubDate>Thu, 05 Apr 2018 15:45:52 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Field-Extraction-and-search/m-p/314576#M94192</guid>
      <dc:creator>richgalloway</dc:creator>
      <dc:date>2018-04-05T15:45:52Z</dc:date>
    </item>
    <item>
      <title>Re: Field Extraction and search</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Field-Extraction-and-search/m-p/314577#M94193</link>
      <description>&lt;P&gt;What value you want to capture from the above event using REX ?&lt;/P&gt;</description>
      <pubDate>Thu, 05 Apr 2018 16:25:15 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Field-Extraction-and-search/m-p/314577#M94193</guid>
      <dc:creator>PowerPacked</dc:creator>
      <dc:date>2018-04-05T16:25:15Z</dc:date>
    </item>
    <item>
      <title>Re: Field Extraction and search</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Field-Extraction-and-search/m-p/314578#M94194</link>
      <description>&lt;P&gt;If you wanted to extract the computer name, message and status you could try something like this:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;rex field=_raw "Status of device '(?&amp;lt;COMPUTERNAME&amp;gt;.*?)' (?&amp;lt;MESSAGE&amp;gt;.*?): (?&amp;lt;STATUS&amp;gt;.*?)\."
&lt;/CODE&gt;&lt;/PRE&gt;</description>
      <pubDate>Thu, 05 Apr 2018 17:13:25 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Field-Extraction-and-search/m-p/314578#M94194</guid>
      <dc:creator>kmaron</dc:creator>
      <dc:date>2018-04-05T17:13:25Z</dc:date>
    </item>
    <item>
      <title>Re: Field Extraction and search</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Field-Extraction-and-search/m-p/314579#M94195</link>
      <description>&lt;P&gt;Thank you!&lt;/P&gt;</description>
      <pubDate>Thu, 05 Apr 2018 18:29:37 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Field-Extraction-and-search/m-p/314579#M94195</guid>
      <dc:creator>cyler</dc:creator>
      <dc:date>2018-04-05T18:29:37Z</dc:date>
    </item>
    <item>
      <title>Re: Field Extraction and search</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Field-Extraction-and-search/m-p/314580#M94196</link>
      <description>&lt;P&gt;Thank you!&lt;/P&gt;</description>
      <pubDate>Thu, 05 Apr 2018 18:29:43 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Field-Extraction-and-search/m-p/314580#M94196</guid>
      <dc:creator>cyler</dc:creator>
      <dc:date>2018-04-05T18:29:43Z</dc:date>
    </item>
    <item>
      <title>Re: Field Extraction and search</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Field-Extraction-and-search/m-p/314581#M94197</link>
      <description>&lt;P&gt;Thank you!&lt;/P&gt;</description>
      <pubDate>Thu, 05 Apr 2018 18:29:53 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Field-Extraction-and-search/m-p/314581#M94197</guid>
      <dc:creator>cyler</dc:creator>
      <dc:date>2018-04-05T18:29:53Z</dc:date>
    </item>
  </channel>
</rss>

