Getting Data In

Why is field is not extracted properly for Windows event log?

Nraj87
Explorer

Field is not extracted properly for Windows event log  where Ip address mark as "Client IP"

Try to extract Field below Regexs but no luck, in _internal logs Regexs was applied to the prorp.conf Successfully.

Please Suggest if anyone face this issue.

Regex 1

(?<ip>\d{1,3}\.\d{1,3}\.\d{1,3}\.\d{1,3})

Regex 2
[^+]Client\s+IP\:\s+(?<ip>\d+.\d+.\d+.\d+)\s+

Labels (1)
Tags (1)
0 Karma

gcusello
SplunkTrust
SplunkTrust

Hi @Nraj87,

could you share a ample of your logs highlighting the string to associate to IP?

Ciao.

Giuseppe

0 Karma
Get Updates on the Splunk Community!

Data Management Digest – November 2025

  Welcome to the inaugural edition of Data Management Digest! As your trusted partner in data innovation, the ...

Splunk Mobile: Your Brand-New Home Screen

Meet Your New Mobile Hub  Hello Splunk Community!  Staying connected to your data—no matter where you are—is ...

Introducing Value Insights (Beta): Understand the Business Impact your organization ...

Real progress on your strategic priorities starts with knowing the business outcomes your teams are delivering ...