Getting Data In

SEDCMD Help

ldnail_at_TI
Path Finder

I am attempting to use SEDCMD on ingest to eliminate extra "data" from my logs (and license). This will be running on Heavy Forwarder. Turns out SEDCMD only works on _raw during ingest which is complicated with the Palo TA as it separates CONFIG, THREAT, TRAFFIC, etc.. into their own sourcetypes, so I have to operate off of sourcetype=pan:log which looks like this:

 

 

Jan 7 10:19:47 palohost 1,2021/06/07: 15:19:46,011901036309,GLOBALPROTECT,...
Jan 7 10:19:47 palohost 1,2021/06/07: 15:19:46,011901036309,HIPMATCH,...
Jan 7 10:19:47 palohost 1,2021/06/07: 15:19:46,011901036309,CONFIG,...
Jan 7 10:19:47 palohost 1,2021/06/07: 15:19:46,011901036309,THREAT,...
Jan 7 10:19:47 palohost 1,2021/06/07: 15:19:46,011901036309,TRAFFIC,...

 

 

I need to perform the SEDCMD only on lines with a TRAFFIC in the 4th field, which I can identify just fine with:     

 

 

^(?:[^,]*,){3}TRAFFIC

 

 

The challenge begins here. I need to capture the first field, which is from start of the line up to the first comma. So for this line:

     Jan 7 10:19:47 palohost 1,2021/06/07: 15:19:46,011901036309,TRAFFIC,...

I only want to capture

     Jan 7 10:19:47 palohost 1

Any advise?

Labels (2)
0 Karma
1 Solution

kamlesh_vaghela
SplunkTrust
SplunkTrust

@ldnail_at_TI 

Can you please try this? 

SEDCMD-a = s/[^,]+(.*TRAFFIC,)/\1 /g

 

Screen:

Screenshot 2021-06-09 at 11.18.30 AM.png

Thanks
KV
▄︻̷̿┻̿═━一

If any of my reply helps you to solve the problem Or gain knowledge, an upvote would be appreciated.

 

View solution in original post

kamlesh_vaghela
SplunkTrust
SplunkTrust

@ldnail_at_TI 

Can you please try this?

[YOUR_SOURCE_TYPE]
SEDCMD-a = s/,(.*)TRAFFIC,(.*)$//g
.
.
.

Thanks
KV
▄︻̷̿┻̿═━一

If any of my reply helps you to solve the problem Or gain knowledge, an upvote would be appreciated. 

0 Karma

ldnail_at_TI
Path Finder

that captures everything afterwards

 

ldnail_at_TI_0-1623158084281.png

thanks

0 Karma

kamlesh_vaghela
SplunkTrust
SplunkTrust

ok @ldnail_at_TI 

What is your expected OP from above screen?

KV

0 Karma

ldnail_at_TI
Path Finder

@kamlesh_vaghela wrote:

ok @ldnail_at_TI 

What is your expected OP from above screen?

KV


"   I only want to capture

     Jan 7 10:19:47 palohost 1
"
which would then be deleted in sedcmd

Tags (1)
0 Karma

kamlesh_vaghela
SplunkTrust
SplunkTrust

@ldnail_at_TI 

SEDCMD-a = s/,(.*)TRAFFIC,(.*)$//g

will give you below results.

Note.  This configuration will work with new coming event only.

 

Screenshot 2021-06-08 at 7.36.42 PM.png

I have used this sample event.

Jan 7 10:19:47 palohost 1,2021/06/07: 15:19:46,011901036309,GLOBALPROTECT,...
Jan 7 10:19:47 palohost 1,2021/06/07: 15:19:46,011901036309,HIPMATCH,...
Jan 7 10:19:47 palohost 1,2021/06/07: 15:19:46,011901036309,CONFIG,...
Jan 7 10:19:47 palohost 1,2021/06/07: 15:19:46,011901036309,THREAT,...
Jan 7 10:19:47 palohost 1,2021/06/07: 15:19:46,011901036309,TRAFFIC,...

 

Thanks
KV
▄︻̷̿┻̿═━一

If any of my reply helps you to solve the problem Or gain knowledge, an upvote would be appreciated.

0 Karma

ldnail_at_TI
Path Finder

Thats pretty much the same result as the last and its trips everything but the first field. Results with your SEDCMD

5/28/21
3:32:29.100 PM
 
May 28 15:32:30 palohost 1


Source log line:

May 28 15:32:30 palohost 1,2021/05/28: 20:32:29,011901036309,TRAFFIC,end,2305,2021/05/28 20:32:29,<someip>,<someip>,0.0.0.0,0.0.0.0,<rule>,<user>,,<protocol>,<virtualsystem>,EXTTUNNEL,EXTINSIDE,tunnel,ethernet0/0,,,150000,,50000,443,0,0,,tcp,allow,143734,112711,31023,340,2021/05/28 20:30:59,75,<classification>,,,,,,,211,129,<action>,123,456,0,0,,palohost,from-policy,,,0,,0,,N/A,0,0,0,0,<some guid>,0,0,,,,,,,

Here is what I want it to look like without the first field.

5/28/21
3:32:29.100 PM
 
,2021/05/28: 20:32:29,011901036309,TRAFFIC,end,2305,2021/05/28 20:32:29,<someip>,<someip>,0.0.0.0,0.0.0.0,<rule>,<user>,,<protocol>,<virtualsystem>,EXTTUNNEL,EXTINSIDE,tunnel,ethernet0/0,,,150000,,50000,443,0,0,,tcp,allow,143734,112711,31023,340,2021/05/28 20:30:59,75,<classification>,,,,,,,211,129,<action>,123,456,0,0,,palohost,from-policy,,,0,,0,,N/A,0,0,0,0,<some guid>,0,0,,,,,,,

 

 

0 Karma

kamlesh_vaghela
SplunkTrust
SplunkTrust

@ldnail_at_TI 

Can you please try this? 

SEDCMD-a = s/[^,]+(.*TRAFFIC,)/\1 /g

 

Screen:

Screenshot 2021-06-09 at 11.18.30 AM.png

Thanks
KV
▄︻̷̿┻̿═━一

If any of my reply helps you to solve the problem Or gain knowledge, an upvote would be appreciated.

 

Got questions? Get answers!

Join the Splunk Community Slack to learn, troubleshoot, and make connections with fellow Splunk practitioners in real time!

Meet up IRL or virtually!

Join Splunk User Groups to connect and learn in-person by region or remotely by topic or industry.

Get Updates on the Splunk Community!

May 2026 Splunk Expert Sessions: Security & Observability

Level Up Your Operations: May 2026 Splunk Expert Sessions Whether you are refining your security posture or ...

Network to App: Observability Unlocked [May & June Series]

In today’s digital landscape, your environment is no longer confined to the data center. It spans complex ...

SPL2 Deep Dives, AppDynamics Integrations, SAML Made Simple and Much More on Splunk ...

Splunk Lantern is Splunk’s customer success center that provides practical guidance from Splunk experts on key ...