Splunk Search

Regex expression

xvxt006
Contributor

Hi

I have events like this and i am using the below expression to extract the command before query string.

sourcetype="access_combined_wcookie" host=prlws*  | rex field=uri "(?P<command>\w+)" | top limit=50 command

But it is capturing gcom as it has . after gcom.suggestions.json. Is there way to capture the whole thing meaning gcom.suggestions.json

167.234.83.253 - - [16/Jul/2013:17:47:44 -0500] "GET /gcom.suggestions.json?selectedText=5GKA2*&start=0&count=Infinity HTTP/1.1" 200 

167.234.83.254 - - [16/Jul/2013:17:47:52 -0500] "GET /GenericController?action=getSecurityToken&domain=new.grainger.com&_=1374014869039 HTTP/1.1" 200
Tags (1)
0 Karma
1 Solution

gfuente
Motivator

Hello

Try with this regex:

...| rex field=uri "(?P< command >(\w+|\.)+)" | ...

*Remove blanks before and after command

Regards

View solution in original post

0 Karma

gfuente
Motivator

Hello

Try with this regex:

...| rex field=uri "(?P< command >(\w+|\.)+)" | ...

*Remove blanks before and after command

Regards

0 Karma

xvxt006
Contributor

Thank you. It worked !!!

0 Karma
Get Updates on the Splunk Community!

Splunk MCP & Agentic AI: Machine Data Without Limits

  Discover how the Splunk Model Context Protocol (MCP) Server can revolutionize the way your organization ...

Finding Based Detections General Availability

Overview  We’ve come a long way, folks, but here in Enterprise Security 8.4 I’m happy to announce Finding ...

Get Your Hands Dirty (and Your Shoes Comfy): The Splunk Experience

Hands-On Learning and Technical Seminars  Sometimes, you just need to see the code. For those looking for a ...