Splunk Search

Rex Question

ho000dor
Explorer

Hi,

Does anyone know what i need to put in between these two fields in order to make the query continue on the ip2 if ip1 is found on a single log event? Sometimes there may not be an ip2... \s+ is what i have currently.

| rex "(?i)(?<ip1>\d{1,3}\.\d{1,3}\.\d{1,3}\.\d{1,3})\s+(?<ip2>\d{1,3}\.\d{1,3}\.\d{1,3}\.\d{1,3})"
0 Karma
1 Solution

ho000dor
Explorer

That's exactly what i'm looking for! Thanks a lot!

View solution in original post

0 Karma

ho000dor
Explorer

That's exactly what i'm looking for! Thanks a lot!

0 Karma

martin_mueller
SplunkTrust
SplunkTrust

It'd be nice for future generations to accept the answer that solved the problem instead. Then others can immediately see the solution if they have similar questions rather than guessing what's the solution.

0 Karma

somesoni2
Revered Legend

Try this (run anywhere sample, before rex part is to generate sample data)

|gentimes start=-1 | eval temp="192.168.1.1 4.2.2.2 blah blah other stuff #otherstuff 192.168.1.1 blah blah#otherstuff blah blah 192.168.1.1 blah blah 4.2.2.2 otherstuff" | table temp | makemv temp delim="#" | mvexpand temp | rename temp as _raw 
| rex "(?i)(?<ip1>\d{1,3}\.\d{1,3}\.\d{1,3}\.\d{1,3})(.*(?<ip2>(\d{1,3}\.\d{1,3}\.\d{1,3}\.\d{1,3}))|.*)"
0 Karma

ho000dor
Explorer

It could vary.

Anything from:

192.168.1.1 4.2.2.2 blah blah other stuff 

or 

otherstuff 192.168.1.1 blah blah

or 

otherstuff blah blah 192.168.1.1 blah blah 4.2.2.2 otherstuff

ip2 can be null if there isn't a second IP. Is that possible or do i have to set up a second | rex?

0 Karma

sk314
Builder

have you tried this rex max_match=2 field=_raw " (?i)(?\d{1,3}.\d{1,3}.\d{1,3}.\d{1,3})*" with max_match parameter set to 2 as mentioned in this http://answers.splunk.com/answers/47381/how-to-extract-all-matching-values-from-an-event-using-regex...

0 Karma

ho000dor
Explorer

Thanks a lot!

0 Karma

sk314
Builder

hodor

also sample data.

0 Karma

richgalloway
SplunkTrust
SplunkTrust

Please post a sample of your data.

---
If this reply helps you, Karma would be appreciated.
0 Karma
Get Updates on the Splunk Community!

Splunk Observability for AI

Don’t miss out on an exciting Tech Talk on Splunk Observability for AI!Discover how Splunk’s agentic AI ...

Splunk Enterprise Security 8.x: The Essential Upgrade for Threat Detection, ...

Watch On Demand the Tech Talk on November 6 at 11AM PT, and empower your SOC to reach new heights! Duration: ...

Splunk Observability as Code: From Zero to Dashboard

For the details on what Self-Service Observability and Observability as Code is, we have some awesome content ...