<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Need help with regex, mvindex, or other option for field-extractions in Splunk Search</title>
    <link>https://community.splunk.com/t5/Splunk-Search/Need-help-with-regex-mvindex-or-other-option-for-field/m-p/321314#M95987</link>
    <description>&lt;OL&gt;
&lt;LI&gt;Dec  5 18:04:51 192.168.69.50 pfsp: Host Detection alert #22049413, start 2017-12-06 00:03:45 GMT, duration 66, direction incoming, host 71.92.104.13, signatures (ICMP, IP Fragmentation, Total Traffic, UDP, DNS Amplification), impact 4.00 Gbps/386.20 Kpps, importance 2, managed_objects ("Tonga"), (parent managed object "nil")&lt;/LI&gt;
&lt;LI&gt;Dec  5 16:19:51 192.168.69.50 pfsp: Host Detection alert #22049331, start 2017-12-05 22:16:45 GMT, duration 186, direction incoming, host 24.177.66.30, signatures (ICMP, IP Fragmentation, TCP NULL, TCP SYN, TCP RST, Total Traffic, UDP), impact 310.64 Mbps/104.45 Kpps, importance 2, managed_objects ("Tonga"), (parent managed object "nil")&lt;/LI&gt;
&lt;/OL&gt;

&lt;P&gt;Please help me parse this log event.  For some reason, it has been parsed as a single field in my Splunk instance. On top of it all, I do not have access to .prof files to change the field extraction criteria hence need to utilize Splunk commands to properly parse them to create a table. &lt;BR /&gt;
&lt;STRONG&gt;Please help me parse the log as following&amp;gt;&amp;gt; _time: Dec  5 18:04:51, collector IP_address: 192.168.69.50, Type: Host Detection, Alert_id: 22049413, start_time: 2017-12-06 00:03:45 GMT, duration: 66, direction: incoming, host: 71.92.104.13, signatures: ICMP, IP Fragmentation, Total Traffic, UDP, DNS Amplification, impact: 4.00 Gbps/386.20 Kpps, importance: 2, managed_objects: Tonga, parent managed object: nil.&lt;/STRONG&gt; &lt;/P&gt;

&lt;P&gt;I have been trying to use Rex commands but since I am not an expert at it. Its not working out so much. Colleague suggested mvindex, I am trying to parse it using that but I hope I can get some help from awesome Splunk community. &lt;/P&gt;</description>
    <pubDate>Tue, 29 Sep 2020 17:04:44 GMT</pubDate>
    <dc:creator>avishek_08</dc:creator>
    <dc:date>2020-09-29T17:04:44Z</dc:date>
    <item>
      <title>Need help with regex, mvindex, or other option for field-extractions</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Need-help-with-regex-mvindex-or-other-option-for-field/m-p/321314#M95987</link>
      <description>&lt;OL&gt;
&lt;LI&gt;Dec  5 18:04:51 192.168.69.50 pfsp: Host Detection alert #22049413, start 2017-12-06 00:03:45 GMT, duration 66, direction incoming, host 71.92.104.13, signatures (ICMP, IP Fragmentation, Total Traffic, UDP, DNS Amplification), impact 4.00 Gbps/386.20 Kpps, importance 2, managed_objects ("Tonga"), (parent managed object "nil")&lt;/LI&gt;
&lt;LI&gt;Dec  5 16:19:51 192.168.69.50 pfsp: Host Detection alert #22049331, start 2017-12-05 22:16:45 GMT, duration 186, direction incoming, host 24.177.66.30, signatures (ICMP, IP Fragmentation, TCP NULL, TCP SYN, TCP RST, Total Traffic, UDP), impact 310.64 Mbps/104.45 Kpps, importance 2, managed_objects ("Tonga"), (parent managed object "nil")&lt;/LI&gt;
&lt;/OL&gt;

&lt;P&gt;Please help me parse this log event.  For some reason, it has been parsed as a single field in my Splunk instance. On top of it all, I do not have access to .prof files to change the field extraction criteria hence need to utilize Splunk commands to properly parse them to create a table. &lt;BR /&gt;
&lt;STRONG&gt;Please help me parse the log as following&amp;gt;&amp;gt; _time: Dec  5 18:04:51, collector IP_address: 192.168.69.50, Type: Host Detection, Alert_id: 22049413, start_time: 2017-12-06 00:03:45 GMT, duration: 66, direction: incoming, host: 71.92.104.13, signatures: ICMP, IP Fragmentation, Total Traffic, UDP, DNS Amplification, impact: 4.00 Gbps/386.20 Kpps, importance: 2, managed_objects: Tonga, parent managed object: nil.&lt;/STRONG&gt; &lt;/P&gt;

&lt;P&gt;I have been trying to use Rex commands but since I am not an expert at it. Its not working out so much. Colleague suggested mvindex, I am trying to parse it using that but I hope I can get some help from awesome Splunk community. &lt;/P&gt;</description>
      <pubDate>Tue, 29 Sep 2020 17:04:44 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Need-help-with-regex-mvindex-or-other-option-for-field/m-p/321314#M95987</guid>
      <dc:creator>avishek_08</dc:creator>
      <dc:date>2020-09-29T17:04:44Z</dc:date>
    </item>
    <item>
      <title>Re: Need help with regex, mvindex, or other option for field-extractions</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Need-help-with-regex-mvindex-or-other-option-for-field/m-p/321315#M95988</link>
      <description>&lt;P&gt;Hi @avishek_08,&lt;/P&gt;

&lt;P&gt;Will you please try this regex ?&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;&amp;lt;your search&amp;gt; | rex "(?m)^(?&amp;lt;time&amp;gt;.*?)\s(?&amp;lt;collector_IP_Address&amp;gt;\d{1,3}\.\d{1,3}\.\d{1,3}\.\d{1,3})\s\w+\:\s(?&amp;lt;Type&amp;gt;.*)#(?&amp;lt;Alert_id&amp;gt;.*),\sstart\s(?&amp;lt;start_time&amp;gt;.*),\sduration\s(?&amp;lt;duration&amp;gt;\d+),\sdirection\s(?&amp;lt;direction&amp;gt;\w+),\shost\s(?&amp;lt;host&amp;gt;\d{1,3}\.\d{1,3}\.\d{1,3}\.\d{1,3}),\ssignatures\s\((?&amp;lt;signatures&amp;gt;.*)\),\simpact\s(?&amp;lt;impact&amp;gt;.*),\simportance\s(?&amp;lt;importance&amp;gt;\d+),\smanaged_objects\s\(\"(?&amp;lt;managed_objects&amp;gt;\w+)\"\),\s\(parent\smanaged\sobject\s\"(?&amp;lt;parent_managed_object&amp;gt;\w+)\"\)"
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;For reference please check regex with sample data at &lt;A href="https://regex101.com/r/IOZJxI/2/"&gt;https://regex101.com/r/IOZJxI/2/&lt;/A&gt;&lt;/P&gt;

&lt;P&gt;I hope this helps.&lt;/P&gt;

&lt;P&gt;Thanks,&lt;BR /&gt;
Harshil&lt;/P&gt;</description>
      <pubDate>Wed, 06 Dec 2017 04:33:44 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Need-help-with-regex-mvindex-or-other-option-for-field/m-p/321315#M95988</guid>
      <dc:creator>harsmarvania57</dc:creator>
      <dc:date>2017-12-06T04:33:44Z</dc:date>
    </item>
    <item>
      <title>Re: Need help with regex, mvindex, or other option for field-extractions</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Need-help-with-regex-mvindex-or-other-option-for-field/m-p/321316#M95989</link>
      <description>&lt;P&gt;Thank you so much Harshil. Let me show you the query I am entering and maybe you can help me pinpoint my error. &lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;index=tonga_logs host=192.168.69.50 "Host Detection" 
| rex "(?m)^(?.*?)\s(?\d{1,3}\.\d{1,3}\.\d{1,3}\.\d{1,3})\s\w+\:\s(?.*)#(?.*),\sstart\s(?.*),\sduration\s(?\d+),\sdirection\s(?\w+),\shost\s(?\d{1,3}\.\d{1,3}\.\d{1,3}\.\d{1,3}),\ssignatures\s\((?.*)\),\simpact\s(?.*),\simportance\s(?\d+),\smanaged_objects\s\(\"(?\w+)\"\),\s\(parent\smanaged\sobject\s\"(?\w+)\"\)"
|table time, collector_IP_Address, Type, Alert_id, start_time, duration, direction, host, signatures, impact, importance, managed_objects
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;I feel like everything is there but it still doesn't display anything for me. &lt;/P&gt;</description>
      <pubDate>Wed, 06 Dec 2017 17:13:14 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Need-help-with-regex-mvindex-or-other-option-for-field/m-p/321316#M95989</guid>
      <dc:creator>avishek_08</dc:creator>
      <dc:date>2017-12-06T17:13:14Z</dc:date>
    </item>
    <item>
      <title>Re: Need help with regex, mvindex, or other option for field-extractions</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Need-help-with-regex-mvindex-or-other-option-for-field/m-p/321317#M95990</link>
      <description>&lt;P&gt;Can you please post your query and sample data in &lt;CODE&gt;Code Sample format (Use Button 101010)&lt;/CODE&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 06 Dec 2017 17:55:41 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Need-help-with-regex-mvindex-or-other-option-for-field/m-p/321317#M95990</guid>
      <dc:creator>harsmarvania57</dc:creator>
      <dc:date>2017-12-06T17:55:41Z</dc:date>
    </item>
    <item>
      <title>Re: Need help with regex, mvindex, or other option for field-extractions</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Need-help-with-regex-mvindex-or-other-option-for-field/m-p/321318#M95991</link>
      <description>&lt;P&gt;If you don't mind me asking: could you direct me how to do that?&lt;/P&gt;</description>
      <pubDate>Wed, 06 Dec 2017 20:42:25 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Need-help-with-regex-mvindex-or-other-option-for-field/m-p/321318#M95991</guid>
      <dc:creator>avishek_08</dc:creator>
      <dc:date>2017-12-06T20:42:25Z</dc:date>
    </item>
    <item>
      <title>Re: Need help with regex, mvindex, or other option for field-extractions</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Need-help-with-regex-mvindex-or-other-option-for-field/m-p/321319#M95992</link>
      <description>&lt;P&gt;When you start typing in the Text Box here on Splunk Answers you will see an icon &lt;CODE&gt;101010&lt;/CODE&gt; which is the &lt;CODE&gt;Code button&lt;/CODE&gt;. This will prevent special characters in your code from being escaped.&lt;/P&gt;

&lt;P&gt;Alternatively, when you start typing in your SPL, you can prefix four spaces just before each new line of your code.&lt;/P&gt;</description>
      <pubDate>Wed, 06 Dec 2017 21:17:15 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Need-help-with-regex-mvindex-or-other-option-for-field/m-p/321319#M95992</guid>
      <dc:creator>niketn</dc:creator>
      <dc:date>2017-12-06T21:17:15Z</dc:date>
    </item>
    <item>
      <title>Re: Need help with regex, mvindex, or other option for field-extractions</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Need-help-with-regex-mvindex-or-other-option-for-field/m-p/321320#M95993</link>
      <description>&lt;P&gt;Thanks for sharing that tip with them @niketnilay &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt; I've just gone ahead and reformatted it in a Code Sample box already so all special characters are visible.&lt;/P&gt;</description>
      <pubDate>Fri, 12 Jan 2018 20:43:08 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Need-help-with-regex-mvindex-or-other-option-for-field/m-p/321320#M95993</guid>
      <dc:creator>ppablo</dc:creator>
      <dc:date>2018-01-12T20:43:08Z</dc:date>
    </item>
  </channel>
</rss>

