Getting Data In

How to write rex to extract multiple Ips?

nivets
Engager

I am trying to extract Ips from the field called Text, where this field contains Ips & some string values ,  this field not contains only one IP all time, it may contain 2 Ips , 3 or 5 or more than that.  Ips will not be same for all the events and the string "value" is same for all the events

eg.,

Text= value 127.0.0.1,10.x.x.x, 10.x.x.1,10.x.x.3

Text= value 145.X.X.2, 19.x.x.3

Text= value 123.X.X.X

So, i need to extract only ip separetely(irrespective of count of Ips) and "value" in one field.

0 Karma
1 Solution

PaulPanther
Motivator

Try 

 

|rex field=Text max_match=0 "(?<ip_address>\d{1,3}\.\d{1,3}\.\d{1,3}\.\d{1,3})"

 

 

View solution in original post

0 Karma

PaulPanther
Motivator

Try 

 

|rex field=Text max_match=0 "(?<ip_address>\d{1,3}\.\d{1,3}\.\d{1,3}\.\d{1,3})"

 

 

0 Karma
Got questions? Get answers!

Join the Splunk Community Slack to learn, troubleshoot, and make connections with fellow Splunk practitioners in real time!

Meet up IRL or virtually!

Join Splunk User Groups to connect and learn in-person by region or remotely by topic or industry.

Get Updates on the Splunk Community!

Why Splunk Customers Should Attend Cisco Live 2026 Las Vegas

Why Splunk Customers Should Attend Cisco Live 2026 Las Vegas     Cisco Live 2026 is almost here, and this ...

What Is the Name of the USB Key Inserted by Bob Smith? (BOTS Hint, Not the Answer)

Hello Splunkers,   So you searched, “what is the name of the usb key inserted by bob smith?”  Not gonna lie… ...

Automating Threat Operations and Threat Hunting with Recorded Future

    Automating Threat Operations and Threat Hunting with Recorded Future June 29, 2026 | Register   Is your ...