Splunk Enterprise Security

Can you help me come up with the regex to extract multiple format events?

nagaraju_chitta
Path Finder
  1. 2018-09-28 14:33:23,Virus found,IP Address: 127.0.0.1,csk name: abcd01

  2. 2018-09-25T09:07:02.240377+00:00 0.0.0.0 Sep 25 16:57:46 host01 Server: Virus found,IP Address: 127.0.0.1,csk name: C8106557

  3. 2018-10-18T01:23:18.692712+00:00 0.0.0.0 Oct 18 09:20:48 host01 Server: Actual Risk found,IP Address: 127.0.0.1,csk name: sN105981

  4. 2018-10-18T00:58:14.244048+00:00 0.0.0.0 Oct 18 08:55:28 Host1 Server: Normal Risk found,IP Address: 127.0.0.1,csk name: N105981

From the above 4 events, I would like to pick the hi-lighted string (mentioned below) using regex. Any idea?

Virus
Virus
Actual Risk
Normal Risk

0 Karma
1 Solution

FrankVl
Ultra Champion

Try the following regex: (?<field1>\w[\w\s]+)\sfound
https://regex101.com/r/f0loQG/1

View solution in original post

0 Karma

FrankVl
Ultra Champion

Try the following regex: (?<field1>\w[\w\s]+)\sfound
https://regex101.com/r/f0loQG/1

0 Karma

nagaraju_chitta
Path Finder

Thank you!!! saved my time 🙂

0 Karma
Get Updates on the Splunk Community!

Observability | How to Think About Instrumentation Overhead (White Paper)

Novice observability practitioners are often overly obsessed with performance. They might approach ...

Cloud Platform | Get Resiliency in the Cloud Event (Register Now!)

IDC Report: Enterprises Gain Higher Efficiency and Resiliency With Migration to Cloud  Today many enterprises ...

The Great Resilience Quest: 10th Leaderboard Update

The tenth leaderboard update (11.23-12.05) for The Great Resilience Quest is out &gt;&gt; As our brave ...