Splunk Search

Getting text from raw event with regex

g_paternicola
Path Finder

 

Hi everyone, 

I'm trying to get a simple text from a raw event, but I can't make it works.

The event looks like this:

2021-09-13_15-24-17.png

and my regex looks like this:

| rex field=_raw "Allow\s(?<GroupName>\w.+)\s+Enroll" 

my issue is, that I only going to get a few of those groups, but not all... for example I will get the Domain Users but not the Enterprise Users which is in the same raw file...

Could please someone help me with this regex?

Labels (3)
Tags (3)
0 Karma
1 Solution

richgalloway
SplunkTrust
SplunkTrust

It's not clear to me what the problem is, but I think the rex command is not extracting all instances of the "Allow" field.  If so, then the max_match option should help.

| rex field=_raw max_match=0 "Allow\s(?<GroupName>\w.+)\s+Enroll" 
---
If this reply helps you, Karma would be appreciated.

View solution in original post

richgalloway
SplunkTrust
SplunkTrust

It's not clear to me what the problem is, but I think the rex command is not extracting all instances of the "Allow" field.  If so, then the max_match option should help.

| rex field=_raw max_match=0 "Allow\s(?<GroupName>\w.+)\s+Enroll" 
---
If this reply helps you, Karma would be appreciated.
Get Updates on the Splunk Community!

OpenTelemetry for Legacy Apps? Yes, You Can!

This article is a follow-up to my previous article posted on the OpenTelemetry Blog, "Your Critical Legacy App ...

UCC Framework: Discover Developer Toolkit for Building Technology Add-ons

The Next-Gen Toolkit for Splunk Technology Add-on Development The Universal Configuration Console (UCC) ...

.conf25 Community Recap

Hello Splunkers, And just like that, .conf25 is in the books! What an incredible few days — full of learning, ...