Splunk Search

In line rex not working once moved to Field Extraction

borisalves
Path Finder

Sample log entry:

23:36:15 '99.999.999.999' GET /downloads//999/SomeProduct/GetComponent/Foo.exe 'Private Message' 200 5814120 19.391

Query:

"Private Message" | rex "(?<httpTimeStamp>\d\d\:\d\d\:\d\d) \'(?<httpClientIp>\d*\.\d*\.\d*\.\d*)\' (?<httpMethod>\w*) (?<httpUri>[^ ]*) \'CitrixOnline Installer-Downloader\' (?<httpResponseCode>\d+) (?<httpBytesDownloaded>[0-9\-]*) (?<httpDownloadTime>[0-9\.]*)" 

In line this rex works exactly as I would expect. Because i do not want to type that out every time i need info on http I added to Manager >> Fields >> Field extractions.

It looks like this on the Field Extractions browser:

http : EXTRACT-SomeName  Inline  "(?<httpTimeStamp>\d\d\:\d\d\:\d\d) \'(?<httpClientIp>\d*\.\d*\.\d*\.\d*)\' (?<httpMethod>\w*) (?<httpUri>[^ ]*) \'Private Message\' (?<httpResponseCode>\d+) (?<httpBytesDownloaded>[0-9\-]*) (?<httpDownloadTime>[0-9\.]*)"

I checked props.conf and everything looks alright.

What might i be missing?

Tags (1)
0 Karma
1 Solution

rsennett_splunk
Splunk Employee
Splunk Employee

As you mentioned: Field Discovery was set to "OFF"

Field discovery is the process Splunk uses to extract fields aside from default fields such as host, source, and sourcetype. This means that Splunk only returns information on default fields and fields that are required to fulfill your search (if you are searching on certain fields, it will extract those fields).

so you must include
| fields httpTimeStamp, httpClientIp, httpMethod, httpUri, httpResponseCode, httpBytesDownloaded, httpDownloadTime

or mention them in some other explicit way in order for Splunk to extract them when Field Discovery is off.

If you were testing with just the sourcetype or with * you wouldn't have seen them.

With Splunk... the answer is always "YES!". It just might require more regex than you're prepared for!

View solution in original post

0 Karma

rsennett_splunk
Splunk Employee
Splunk Employee

As you mentioned: Field Discovery was set to "OFF"

Field discovery is the process Splunk uses to extract fields aside from default fields such as host, source, and sourcetype. This means that Splunk only returns information on default fields and fields that are required to fulfill your search (if you are searching on certain fields, it will extract those fields).

so you must include
| fields httpTimeStamp, httpClientIp, httpMethod, httpUri, httpResponseCode, httpBytesDownloaded, httpDownloadTime

or mention them in some other explicit way in order for Splunk to extract them when Field Discovery is off.

If you were testing with just the sourcetype or with * you wouldn't have seen them.

With Splunk... the answer is always "YES!". It just might require more regex than you're prepared for!
0 Karma
Get Updates on the Splunk Community!

Splunk at Cisco Live 2025: Learning, Innovation, and a Little Bit of Mr. Brightside

Pack your bags (and maybe your dancing shoes)—Cisco Live is heading to San Diego, June 8–12, 2025, and Splunk ...

Splunk App Dev Community Updates – What’s New and What’s Next

Welcome to your go-to roundup of everything happening in the Splunk App Dev Community! Whether you're building ...

The Latest Cisco Integrations With Splunk Platform!

Join us for an exciting tech talk where we’ll explore the latest integrations in Cisco &#43; Splunk! We’ve ...