Splunk Search

In line rex not working once moved to Field Extraction

borisalves
Path Finder

Sample log entry:

23:36:15 '99.999.999.999' GET /downloads//999/SomeProduct/GetComponent/Foo.exe 'Private Message' 200 5814120 19.391

Query:

"Private Message" | rex "(?<httpTimeStamp>\d\d\:\d\d\:\d\d) \'(?<httpClientIp>\d*\.\d*\.\d*\.\d*)\' (?<httpMethod>\w*) (?<httpUri>[^ ]*) \'CitrixOnline Installer-Downloader\' (?<httpResponseCode>\d+) (?<httpBytesDownloaded>[0-9\-]*) (?<httpDownloadTime>[0-9\.]*)" 

In line this rex works exactly as I would expect. Because i do not want to type that out every time i need info on http I added to Manager >> Fields >> Field extractions.

It looks like this on the Field Extractions browser:

http : EXTRACT-SomeName  Inline  "(?<httpTimeStamp>\d\d\:\d\d\:\d\d) \'(?<httpClientIp>\d*\.\d*\.\d*\.\d*)\' (?<httpMethod>\w*) (?<httpUri>[^ ]*) \'Private Message\' (?<httpResponseCode>\d+) (?<httpBytesDownloaded>[0-9\-]*) (?<httpDownloadTime>[0-9\.]*)"

I checked props.conf and everything looks alright.

What might i be missing?

Tags (1)
0 Karma
1 Solution

rsennett_splunk
Splunk Employee
Splunk Employee

As you mentioned: Field Discovery was set to "OFF"

Field discovery is the process Splunk uses to extract fields aside from default fields such as host, source, and sourcetype. This means that Splunk only returns information on default fields and fields that are required to fulfill your search (if you are searching on certain fields, it will extract those fields).

so you must include
| fields httpTimeStamp, httpClientIp, httpMethod, httpUri, httpResponseCode, httpBytesDownloaded, httpDownloadTime

or mention them in some other explicit way in order for Splunk to extract them when Field Discovery is off.

If you were testing with just the sourcetype or with * you wouldn't have seen them.

With Splunk... the answer is always "YES!". It just might require more regex than you're prepared for!

View solution in original post

0 Karma

rsennett_splunk
Splunk Employee
Splunk Employee

As you mentioned: Field Discovery was set to "OFF"

Field discovery is the process Splunk uses to extract fields aside from default fields such as host, source, and sourcetype. This means that Splunk only returns information on default fields and fields that are required to fulfill your search (if you are searching on certain fields, it will extract those fields).

so you must include
| fields httpTimeStamp, httpClientIp, httpMethod, httpUri, httpResponseCode, httpBytesDownloaded, httpDownloadTime

or mention them in some other explicit way in order for Splunk to extract them when Field Discovery is off.

If you were testing with just the sourcetype or with * you wouldn't have seen them.

With Splunk... the answer is always "YES!". It just might require more regex than you're prepared for!
0 Karma
Get Updates on the Splunk Community!

Routing logs with Splunk OTel Collector for Kubernetes

The Splunk Distribution of the OpenTelemetry (OTel) Collector is a product that provides a way to ingest ...

Welcome to the Splunk Community!

(view in My Videos) We're so glad you're here! The Splunk Community is place to connect, learn, give back, and ...

Tech Talk | Elevating Digital Service Excellence: The Synergy of Splunk RUM & APM

Elevating Digital Service Excellence: The Synergy of Real User Monitoring and Application Performance ...