Splunk Search

Help with Regex

kiran331
Builder

Hi

How can I extract the "TCP_MISS/200" and "TCP_MISS_SSL/200" or similar from the event below?

1466609862.644 109 1.2.3.55 TCP_MISS/200 387 POST http://sdsd.com/put "user@dd.com" ...........

1466609862.632 17096 2.3.4.167 TCP_MISS_SSL/200 1036 GET https://..................

Tags (1)
0 Karma
1 Solution

richgalloway
SplunkTrust
SplunkTrust

Try

... | rex "(?<field>TCP[^\s]+)" | ...
---
If this reply helps you, Karma would be appreciated.

View solution in original post

0 Karma

richgalloway
SplunkTrust
SplunkTrust

Try

... | rex "(?<field>TCP[^\s]+)" | ...
---
If this reply helps you, Karma would be appreciated.
0 Karma
Get Updates on the Splunk Community!

Observe and Secure All Apps with Splunk

  Join Us for Our Next Tech Talk: Observe and Secure All Apps with SplunkAs organizations continue to innovate ...

Splunk Decoded: Business Transactions vs Business IQ

It’s the morning of Black Friday, and your e-commerce site is handling 10x normal traffic. Orders are flowing, ...

Fastest way to demo Observability

I’ve been having a lot of fun learning about Kubernetes and Observability. I set myself an interesting ...