How to use Regex in props.conf to extract the fields in the below sample event with source type "syslog".
08/11/17 13:30:34 abckdefrg44 openfep: [log.c]: CPM ALSLLER (ID 5): pin_alarm-DOFRI 188.8.131.52.0 -c 453 1 0 -r 449 0 -v "ONLINE" "FEP" "level Group 33. status" "Status now online" &
Group: level Group 33. status
Status: Status now online
Please read this article. It is insightful about the use of index time field extractions:
Splunk best practice is to do search time field extractions. There are those that are questioning this as you can see by reading the whole answer and comment on this in this article:
If you are still intent on doing index-time extraction, read this article, as it might give you some help in doing it:
And for the official documentation, see this page:
And finally, this is the REGEX I would use:
But it should go in the
Assuming that there's some level of consistency in your syslog event, and "FEP" will always be there, you could do the following props.conf extract, using "FEP" as a starting point for your regex.
[syslog] EXTRACT-Group = \"FEP\"\s\"(.*?)\" EXTRACT-Status = \"FEP\"\s\"(?:.*?)\"\s\"(.*?)\"
Your could use regex101 to practice your regex extractions, make sure to anonymize the data before doing so, nobody knows what that site does to your sample events.
Hope it helps, shout if you need more help.