Splunk Search

How can I use a subsearch as fields in my report?

qtopia7100
Explorer

This is the search I'm working with:

index="*-network" (sourcetype="cisco:asa" OR sourcetype="routers") user="user*" ("session terminated" OR "session started") | table _time, user, src_ip

I want a field that has "session terminated" OR "session started" based on which value is in the log.

0 Karma

gokadroid
Motivator

Please try this:

index="*-network" (sourcetype="cisco:asa" OR sourcetype="routers") user="user*" ("session terminated" OR "session started") 
| rex field=_raw ".*(?<sessionState>(session\s*(terminated|started))).*"
| table _time, user, src_ip, sessionState

See the extraction here

If you want to make it case insensitive like the search bar will do try (?i) in rex :

...| rex field=_raw ".*(?<sessionState>(?i)(session\s*(terminated|started))).*"| ...
0 Karma
Get Updates on the Splunk Community!

New Year, New Changes for Splunk Certifications

As we embrace a new year, we’re making a small but important update to the Splunk Certification ...

Stay Connected: Your Guide to January Tech Talks, Office Hours, and Webinars!

What are Community Office Hours? Community Office Hours is an interactive 60-minute Zoom series where ...

[Puzzles] Solve, Learn, Repeat: Reprocessing XML into Fixed-Length Events

This challenge was first posted on Slack #puzzles channelFor a previous puzzle, I needed a set of fixed-length ...