Splunk Search

Need help with rex

xvxt006
Contributor

Hi,

i am using this expression - base search | rex field=uri "better\?q=(?[^&]+)$"

and i was expecting to return events which ends with having only q value but not having others as shown below.

better?q=GARAGE+DOOR+9+FT+WIDE

but it is showing all the events which have values after & (startIndex=000041&itemsperpage=0030)

better?q=GARAGE+DOOR+9+FT+WIDE&startIndex=000041&itemsperpage=0030

Any idea what i am missing here?

Tags (1)
0 Karma

somesoni2
Revered Legend

Try this (run anywhere)

|stats count | eval uri="better?q=GARAGE+DOOR+9+FT+WIDE##better?q=GARAGE+DOOR+9+FT+WIDE&startIndex=000041&itemsperpage=0030" | table uri | makemv delim="##" uri | mvexpand uri  
| regex uri="better\?q=([^&]+)$"


<<Your base search with field uri >>  | regex uri="better\?q=([^&]+)$"

somesoni2
Revered Legend

That is just a syntax to get example data to work on(since I don't have sample logs). Just replace everything before "regex" command with your base search.

xvxt006
Contributor

i see that you are using eval for the acutal uri i gave. But I just gave an example to show you what i want. I have lot of events like that. I cannot put all of those in my search query right?

0 Karma

richgalloway
SplunkTrust
SplunkTrust

I had success in RegExr with this string:

better\?q=([^&]+)&
---
If this reply helps you, Karma would be appreciated.
0 Karma
Get Updates on the Splunk Community!

.conf24 | Day 0

Hello Splunk Community! My name is Chris, and I'm based in Canberra, Australia's capital, and I travelled for ...

Enhance Security Visibility with Splunk Enterprise Security 7.1 through Threat ...

 (view in My Videos)Struggling with alert fatigue, lack of context, and prioritization around security ...

Troubleshooting the OpenTelemetry Collector

  In this tech talk, you’ll learn how to troubleshoot the OpenTelemetry collector - from checking the ...