Splunk Search

Help with Regex

kiran331
Builder

Hi

How can I extract the "TCP_MISS/200" and "TCP_MISS_SSL/200" or similar from the event below?

1466609862.644 109 1.2.3.55 TCP_MISS/200 387 POST http://sdsd.com/put "user@dd.com" ...........

1466609862.632 17096 2.3.4.167 TCP_MISS_SSL/200 1036 GET https://..................

Tags (1)
0 Karma
1 Solution

richgalloway
SplunkTrust
SplunkTrust

Try

... | rex "(?<field>TCP[^\s]+)" | ...
---
If this reply helps you, Karma would be appreciated.

View solution in original post

0 Karma

richgalloway
SplunkTrust
SplunkTrust

Try

... | rex "(?<field>TCP[^\s]+)" | ...
---
If this reply helps you, Karma would be appreciated.
0 Karma
Get Updates on the Splunk Community!

OpenTelemetry for Legacy Apps? Yes, You Can!

This article is a follow-up to my previous article posted on the OpenTelemetry Blog, "Your Critical Legacy App ...

UCC Framework: Discover Developer Toolkit for Building Technology Add-ons

The Next-Gen Toolkit for Splunk Technology Add-on Development The Universal Configuration Console (UCC) ...

.conf25 Community Recap

Hello Splunkers, And just like that, .conf25 is in the books! What an incredible few days — full of learning, ...