Splunk Search

Help extracting a field from an event

jlim2003
New Member

Hello, I need help extracting the following value from this sample event:

2015-10-12 09:15:01,590 CDC_HB_RCV C M DT 2015-10-12 13:00:01.980943 2015-10-12 13:00:05.653721 000:00:03.672778 Y
2015-10-12 09:15:01,482 CDC_HB_SEND M <none> RF 2015-10-12 13:15:01.480964

Event types are CDC_HB_RCV and CDC_HB_SEND.

The bolded M in the first event is Destination_Code, required in the CDC_HB_RCV event type. The "C" to the left of it is Source_Code.

However, in the CDC_HB_SEND type, it is blank (no value, since there is no destination code). The Source_Code for that event is M, on the left.

There are multiple CDC_HB_SEND and CDC_HB_RCV events, and they are all under one sourcetype=cdc_heartbeat_log.

I have had trouble extracting since CDC_HB_RCV contains the Destination_Code field, and CDC_HB_SEND does not, however they are all under the same sourcetype.

I have managed to extract all the other relevant fields in the data, except for Destination_Code.

Any assistance is appreciated. Thanks!

Tags (1)
0 Karma

maciep
Champion

You don't need to have all of your extractions in one command. So why not just create a separate extraction for destination code that matches on the actual text "CDC_HB_RCV". Matybe something like this?

CDC_HB_RCV\s\w\s(?<destination_code>\w)

Or is not that consistent? Meaning, can the rcv events not have a dest code? And/Or can some send events have one?

0 Karma
Get Updates on the Splunk Community!

Fun with Regular Expression - multiples of nine

Fun with Regular Expression - multiples of nineThis challenge was first posted on Slack #regex channel ...

[Live Demo] Watch SOC transformation in action with the reimagined Splunk Enterprise ...

Overwhelmed SOC? Splunk ES Has Your Back Tool sprawl, alert fatigue, and endless context switching are making ...

What’s New & Next in Splunk SOAR

Security teams today are dealing with more alerts, more tools, and more pressure than ever.  Join us on ...