Splunk Search

Extract Fields Apache Logs

miguelebf
New Member

Hi i have raw data like this:
192.0.100.3 - - [30/Jul/2019:00:06:05 -0500] "GET /test/ HTTP/1.1" 403 207 "-" "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/75.0.3770.142 Safari/537.36"
clientip = 192.0.200.2 host = cliente uri = /test/ useragent = Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/75.0.3770.142 Safari/537.36

and i need ectract IP , Time ,User Agent , and URL help please, its a logs from apache

Tags (1)
0 Karma

jawaharas
Motivator

Have you tried using default 'access_combined' sourcetype ?
https://docs.splunk.com/Documentation/Splunk/7.3.0/Data/Listofpretrainedsourcetypes

if the sourcetype not available, try below add-on(Add-on for Access Combined) -
https://splunkbase.splunk.com/app/3434/

0 Karma

jawaharas
Motivator

@miguelebf
Can you accept the answer if it's helped you? Thanks.

0 Karma
Get Updates on the Splunk Community!

Splunk Decoded: Service Maps vs Service Analyzer Tree View vs Flow Maps

It’s Monday morning, and your phone is buzzing with alert escalations – your customer-facing portal is running ...

What’s New in Splunk Observability – September 2025

What's NewWe are excited to announce the latest enhancements to Splunk Observability, designed to help ITOps ...

Fun with Regular Expression - multiples of nine

Fun with Regular Expression - multiples of nineThis challenge was first posted on Slack #regex channel ...