Splunk Search

How to edit my search to create a new extracted field with rex?

JoshuaJohn
Contributor

I have this search

index=nitro_prod_ecomm earliest=-30m@m | rex field=_raw "\d\d\:\d\d\:\d\d\s+(?\d+\.\d+)" | where ResponseTime>1| rex field=_raw "(?(GET|POST)\s+\/(\w+))" |stats count by header_page

It gets me the first part of a URL from the raw rex field, which is what I want.
I want to get this information into my extracted fields section on the left, I want to be able to click "header_page" and it will show me what is being displayed by this search such as "GET /store" etc. (Like below)
alt text

When attempting to create an extracted field via the automatic builder, it cannot do it and needs a custom written one. I tried just using the rex from the search, but it didn't seem to work.

Any ideas?

0 Karma
1 Solution

sundareshr
Legend

Add this to your props.conf

[sourcetype_stanza]
EXTRACT-headepage = (?<header_page>(GET|POST)\s+\/(\w+))

http://docs.splunk.com/Documentation/Splunk/6.4.2/Knowledge/Createandmaintainsearch-timefieldextract...

View solution in original post

0 Karma

sundareshr
Legend

Add this to your props.conf

[sourcetype_stanza]
EXTRACT-headepage = (?<header_page>(GET|POST)\s+\/(\w+))

http://docs.splunk.com/Documentation/Splunk/6.4.2/Knowledge/Createandmaintainsearch-timefieldextract...

0 Karma

richgalloway
SplunkTrust
SplunkTrust

Can you share some sample data?

---
If this reply helps you, Karma would be appreciated.
0 Karma

JoshuaJohn
Contributor

header_page ________________count
GET /price
_______________________ 3
GET /product_________________3956
POST /rest
__________________373
GET /search
________________355
GET /search_error _
____________1
GET /store
______________________382

Basically this ^

0 Karma
Get Updates on the Splunk Community!

See just what you’ve been missing | Observability tracks at Splunk University

Looking to sharpen your observability skills so you can better understand how to collect and analyze data from ...

Weezer at .conf25? Say it ain’t so!

Hello Splunkers, The countdown to .conf25 is on-and we've just turned up the volume! We're thrilled to ...

How SC4S Makes Suricata Logs Ingestion Simple

Network security monitoring has become increasingly critical for organizations of all sizes. Splunk has ...