Splunk Search

Help with Regex

kiran331
Builder

Hi

How can I extract the "TCP_MISS/200" and "TCP_MISS_SSL/200" or similar from the event below?

1466609862.644 109 1.2.3.55 TCP_MISS/200 387 POST http://sdsd.com/put "user@dd.com" ...........

1466609862.632 17096 2.3.4.167 TCP_MISS_SSL/200 1036 GET https://..................

Tags (1)
0 Karma
1 Solution

richgalloway
SplunkTrust
SplunkTrust

Try

... | rex "(?<field>TCP[^\s]+)" | ...
---
If this reply helps you, Karma would be appreciated.

View solution in original post

0 Karma

richgalloway
SplunkTrust
SplunkTrust

Try

... | rex "(?<field>TCP[^\s]+)" | ...
---
If this reply helps you, Karma would be appreciated.
0 Karma
Get Updates on the Splunk Community!

.conf25 Community Recap

Hello Splunkers, And just like that, .conf25 is in the books! What an incredible few days — full of learning, ...

Splunk App Developers | .conf25 Recap & What’s Next

If you stopped by the Builder Bar at .conf25 this year, thank you! The retro tech beer garden vibes were ...

Congratulations to the 2025-2026 SplunkTrust!

Hello, Splunk Community! We are beyond thrilled to announce our newest group of SplunkTrust members!  The ...