Splunk Search

Need help with rex

xvxt006
Contributor

Hi,

i am using this expression - base search | rex field=uri "better\?q=(?[^&]+)$"

and i was expecting to return events which ends with having only q value but not having others as shown below.

better?q=GARAGE+DOOR+9+FT+WIDE

but it is showing all the events which have values after & (startIndex=000041&itemsperpage=0030)

better?q=GARAGE+DOOR+9+FT+WIDE&startIndex=000041&itemsperpage=0030

Any idea what i am missing here?

Tags (1)
0 Karma

somesoni2
Revered Legend

Try this (run anywhere)

|stats count | eval uri="better?q=GARAGE+DOOR+9+FT+WIDE##better?q=GARAGE+DOOR+9+FT+WIDE&startIndex=000041&itemsperpage=0030" | table uri | makemv delim="##" uri | mvexpand uri  
| regex uri="better\?q=([^&]+)$"


<<Your base search with field uri >>  | regex uri="better\?q=([^&]+)$"

somesoni2
Revered Legend

That is just a syntax to get example data to work on(since I don't have sample logs). Just replace everything before "regex" command with your base search.

xvxt006
Contributor

i see that you are using eval for the acutal uri i gave. But I just gave an example to show you what i want. I have lot of events like that. I cannot put all of those in my search query right?

0 Karma

richgalloway
SplunkTrust
SplunkTrust

I had success in RegExr with this string:

better\?q=([^&]+)&
---
If this reply helps you, Karma would be appreciated.
0 Karma
Get Updates on the Splunk Community!

Get Early Access to AI Playbook Authoring: Apply for the Alpha Private Preview ...

Passionate about security automation? Apply now to our AI Playbook Authoring Alpha private preview ...

Reduce and Transform Your Firewall Data with Splunk Data Management

Managing high-volume firewall data has always been a challenge. Noisy events and verbose traffic logs often ...

Automatic Discovery Part 1: What is Automatic Discovery in Splunk Observability Cloud ...

If you’ve ever deployed a new database cluster, spun up a caching layer, or added a load balancer, you know it ...