Splunk Search

Formating question and regex

CYBR_AH
Explorer

Hi All,

I'm trying to search for start up and shutdown message of AWS instances and build a nice table. On my test instance, the first message on the /var/log/message is the following line when I run 'earliest=-4h@h "start" | regex _raw="rsyslogd:.*" | table _raw'

Mar 16 14:42:58 ip-10-0-0-2 rsyslogd: [origin software="rsyslogd" swVersion="5.8.10" x-pid="899" x-info="http://www.rsyslog.com"] start

I'd like to break this down and just keep.

_time, IP, Command
timestamp, 10.0.0.2, Start

Am I going about this the wrong way?

Tags (1)
0 Karma

jkat54
SplunkTrust
SplunkTrust
 earliest=-4h@h | rex field=_raw '(?<=swVersion..)(?<swversion>.*)" x-pid=.(?<pid>\d+)" x-info="(?<info>.*)"]' | table swVersion, pid, info

jkat54
SplunkTrust
SplunkTrust

Hey thanks for the upvote CYBR_AH, if it solved your problem please mark it as the answer too. Cheers!

0 Karma

somesoni2
Revered Legend

Try something like this (assuming you WANT to display these fields - _time, IP, Command)

earliest=-4h@h "start" | regex _raw="rsyslogd:.*" | rex "ip-(?<IP>\d+-\d+-\d+-\d+)\s[^\]]+\s+(?<Command>.*)" | table _time IP Command
0 Karma
Get Updates on the Splunk Community!

Faster Insights with AI, Streamlined Cloud-Native Operations, and More New Lantern ...

Splunk Lantern is a Splunk customer success center that provides practical guidance from Splunk experts on key ...

Splunk Enterprise Security: Your Command Center for PCI DSS Compliance

Every security professional knows the drill. The PCI DSS audit is approaching, and suddenly everyone's asking ...

Developer Spotlight with Guilhem Marchand

From Splunk Engineer to Founder: The Journey Behind TrackMe    After spending over 12 years working full time ...