Splunk Search

How extract field using rex?

karthi2809
Builder

How to extract fields in between | servername |

Which i am using in rex 

^[^\|\n]*\|(?P<Server>\w+\.\w+\.\w+\.\w+\s+)

But its not extracting the all the servers

05-Apr-2023 04:42:44:PM: |IISN11WCRL02.nnp.anp.co.xx | Ping statistics for 10.10.10.194: Packets: Sent = 4, Received = 4, Lost = 0 (0% loss), Approximate round trip times in milli-seconds: Minimum = 54ms, Maximum = 54ms, Average = 54ms
4/5/23
4:42:41.000 AM
05-Apr-2023 04:42:41:PM: |IISN11WCRL02.nnp.anp.co.xx | Ping statistics for 10.10.10.194: Packets: Sent = 4, Received = 4, Lost = 0 (0% loss), Approximate round trip times in milli-seconds: Minimum = 54ms, Maximum = 57ms, Average = 54ms
4/5/23
4:42:38.000 AM
05-Apr-2023 04:42:38:PM: |IIISN11WCRL02.nnp.anp.co.xx | Ping statistics for 10.10.10.194: Packets: Sent = 4, Received = 4, Lost = 0 (0% loss), Approximate round trip times in milli-seconds: Minimum = 53ms, Maximum = 54ms, Average = 53ms
4/5/23
4:42:34.000 AM
05-Apr-2023 04:42:34:PM: |naz11sry001l | Ping statistics for 10.10.10.194: Packets: Sent = 4, Received = 4, Lost = 0 (0% loss), Approximate round trip times in milli-seconds: Minimum = 53ms, Maximum = 55ms, Average = 54ms
4/5/23
4:42:31.000 AM
05-Apr-2023 04:42:31:PM: |naz11sry002l | Ping statistics for 10.10.10.194: Packets: Sent = 4, Received = 4, Lost = 0 (0% loss), Approximate round trip times in milli-seconds: Minimum = 53ms, Maximum = 55ms, Average = 54ms

Labels (1)
Tags (1)
0 Karma
1 Solution

Gr0und_Z3r0
Contributor

@karthi2809  you can try something like this....

 

|  rex field=_raw "\|(?P<Server>[\w\.]+)\s\|"

 

 

Gr0und_Z3r0_0-1680762808420.png


~ If the reply helps an upvote would be appreciated.

View solution in original post

Gr0und_Z3r0
Contributor

@karthi2809  you can try something like this....

 

|  rex field=_raw "\|(?P<Server>[\w\.]+)\s\|"

 

 

Gr0und_Z3r0_0-1680762808420.png


~ If the reply helps an upvote would be appreciated.

ITWhisperer
SplunkTrust
SplunkTrust

Try this

| rex "^[^\|\n]*\|(?P<Server>[^\|]+)"
Get Updates on the Splunk Community!

Building Reliable Asset and Identity Frameworks in Splunk ES

 Accurate asset and identity resolution is the backbone of security operations. Without it, alerts are ...

Cloud Monitoring Console - Unlocking Greater Visibility in SVC Usage Reporting

For Splunk Cloud customers, understanding and optimizing Splunk Virtual Compute (SVC) usage and resource ...

Automatic Discovery Part 3: Practical Use Cases

If you’ve enabled Automatic Discovery in your install of the Splunk Distribution of the OpenTelemetry ...