Splunk Search

Field extraction

Nadhiya_Dubai
Explorer

/data/scripts/esx/output_crc/dc1-ch1-esxi05.dca.com-vmnic0-20191211-10:40:40.txt

I need to extract the field "dc1-ch1-esxi05.dca.com" as host and "vmnic0" as interface and "20191211-10:40:40" as timestamp

Tags (1)
0 Karma

vnravikumar
Champion

Hi

Try this

| makeresults 
| eval path="/data/scripts/esx/output_crc/dc1-ch1-esxi05.dca.com-vmnic0-20191211-10:40:40.txt" 
| rex field=path "(?P<host>[^\/]+)-(?P<interface>\w+)-(?P<timestamp>\d{8}-\d{2}:\d{2}:\d{2}).txt$"
0 Karma
Get Updates on the Splunk Community!

Splunk MCP & Agentic AI: Machine Data Without Limits

  Discover how the Splunk Model Context Protocol (MCP) Server can revolutionize the way your organization ...

Finding Based Detections General Availability

Overview  We’ve come a long way, folks, but here in Enterprise Security 8.4 I’m happy to announce Finding ...

Get Your Hands Dirty (and Your Shoes Comfy): The Splunk Experience

Hands-On Learning and Technical Seminars  Sometimes, you just need to see the code. For those looking for a ...