Splunk Search

Extract field from a new line

ToniHuynh
Explorer

Hi all,

I would like to extract the IP of the client: from the below Message.

Message=Internal event: A client issued a search operation with the following options.

Client:

172.25.1.250:6247

Starting node: DC=abc,DC=contoso,DC=com,DC=au

Filter: ( & ( ! (uSNChanged=*) ) ( & ( | (mail=*) (proxyAddresses=*) ) ( | (objectClass=contact) (objectClass=publicFolder) (objectClass=group) (objectClass=person) (objectClass=organizationalPerson) (objectClass=user) (FALSE) ) ) )

Search scope:

subtree

Attribute selection:

sAMAccountName,mail,proxyAddresses,objectClass,uSNChanged

I can make it works on regex101 but splunk does not show anything.

| rex field=Message max_match=0 "Client:(?<Client>\n.*)"

 

 

 

Labels (1)
0 Karma
1 Solution

bowesmana
SplunkTrust
SplunkTrust

See the following - the trick is to use (?m) to span multiple lines

| makeresults
| eval Message="Internal event: A client issued a search operation with the following options.

Client:

172.25.1.250:6247

Starting node: DC=abc,DC=contoso,DC=com,DC=au

Filter: ( & ( ! (uSNChanged=*) ) ( & ( | (mail=*) (proxyAddresses=*) ) ( | (objectClass=contact) (objectClass=publicFolder) (objectClass=group) (objectClass=person) (objectClass=organizationalPerson) (objectClass=user) (FALSE) ) ) )

Search scope:

subtree

Attribute selection:

sAMAccountName,mail,proxyAddresses,objectClass,uSNChanged"
| rex field=Message max_match=0 "(?m)Client:[^\d]+(?<Client>\d+\.\d+\.\d+\.\d+)"

View solution in original post

0 Karma

bowesmana
SplunkTrust
SplunkTrust

See the following - the trick is to use (?m) to span multiple lines

| makeresults
| eval Message="Internal event: A client issued a search operation with the following options.

Client:

172.25.1.250:6247

Starting node: DC=abc,DC=contoso,DC=com,DC=au

Filter: ( & ( ! (uSNChanged=*) ) ( & ( | (mail=*) (proxyAddresses=*) ) ( | (objectClass=contact) (objectClass=publicFolder) (objectClass=group) (objectClass=person) (objectClass=organizationalPerson) (objectClass=user) (FALSE) ) ) )

Search scope:

subtree

Attribute selection:

sAMAccountName,mail,proxyAddresses,objectClass,uSNChanged"
| rex field=Message max_match=0 "(?m)Client:[^\d]+(?<Client>\d+\.\d+\.\d+\.\d+)"
0 Karma

ToniHuynh
Explorer

Thanks so much. 

 

0 Karma
Get Updates on the Splunk Community!

OpenTelemetry for Legacy Apps? Yes, You Can!

This article is a follow-up to my previous article posted on the OpenTelemetry Blog, "Your Critical Legacy App ...

UCC Framework: Discover Developer Toolkit for Building Technology Add-ons

The Next-Gen Toolkit for Splunk Technology Add-on Development The Universal Configuration Console (UCC) ...

.conf25 Community Recap

Hello Splunkers, And just like that, .conf25 is in the books! What an incredible few days — full of learning, ...