Splunk Search

Can anyone help resolve the issue with my search for events relating to USB violations

wlwilliams01
Engager

alt text

Tags (1)

DavidHourani
Super Champion

Hi @wlwilliams01,

Use a labeled capturing group instead of (?.) and (?0x0) as shown here :
https://www.regular-expressions.info/named.html
which should look something like this :

(?<name>group) 

Also you can use the following site to validate your regex:
www.regex101.com

Let me know if it helps.

Cheers,
David

0 Karma

tom_frotscher
Builder

Hi,

you can not just use (?.) as a group. You need to add a name for at least one group like this:

(?<name>.+)

which would extract the results of the group to a field called "name" in Splunk. If you want to match everything in a group without giving a name you might be able to use (?:).

Greetings

Tom

0 Karma
Get Updates on the Splunk Community!

Observe and Secure All Apps with Splunk

  Join Us for Our Next Tech Talk: Observe and Secure All Apps with SplunkAs organizations continue to innovate ...

Splunk Decoded: Business Transactions vs Business IQ

It’s the morning of Black Friday, and your e-commerce site is handling 10x normal traffic. Orders are flowing, ...

Fastest way to demo Observability

I’ve been having a lot of fun learning about Kubernetes and Observability. I set myself an interesting ...