Getting Data In

Why is field is not extracted properly for Windows event log?

Nraj87
Explorer

Field is not extracted properly for Windows event log  where Ip address mark as "Client IP"

Try to extract Field below Regexs but no luck, in _internal logs Regexs was applied to the prorp.conf Successfully.

Please Suggest if anyone face this issue.

Regex 1

(?<ip>\d{1,3}\.\d{1,3}\.\d{1,3}\.\d{1,3})

Regex 2
[^+]Client\s+IP\:\s+(?<ip>\d+.\d+.\d+.\d+)\s+

Labels (1)
Tags (1)
0 Karma

gcusello
SplunkTrust
SplunkTrust

Hi @Nraj87,

could you share a ample of your logs highlighting the string to associate to IP?

Ciao.

Giuseppe

0 Karma
Get Updates on the Splunk Community!

Automatic Discovery Part 1: What is Automatic Discovery in Splunk Observability Cloud ...

If you’ve ever deployed a new database cluster, spun up a caching layer, or added a load balancer, you know it ...

Real-Time Fraud Detection: How Splunk Dashboards Protect Financial Institutions

Financial fraud isn't slowing down. If anything, it's getting more sophisticated. Account takeovers, credit ...

Splunk + ThousandEyes: Correlate frontend, app, and network data to troubleshoot ...

 Are you tired of troubleshooting delays caused by siloed frontend, application, and network data? We've got a ...