Splunk Search

Single line of regex to extract multiple fields

token1
Explorer

I've seen the TA Unified2 do this, one single line of regex pulling all relevant fields from snort logs.  I'm wanting to do the same thing for some NetApp logs I have:

The regex101 URL is:  https://regex101.com/r/zlhxN9/1/

It has pretty good test data.  The first line is a very typical format.  The second line has a doozy, when an operation is carried out there is a field between the "::" delimitators that is further broken up with "<>" delimitators. 

I'm at a loss here as you can see in the regex101 URL.

Labels (1)
0 Karma

ITWhisperer
SplunkTrust
SplunkTrust

I am not sure what the question is here. Please can you explain further?

0 Karma
Get Updates on the Splunk Community!

Building Reliable Asset and Identity Frameworks in Splunk ES

 Accurate asset and identity resolution is the backbone of security operations. Without it, alerts are ...

Cloud Monitoring Console - Unlocking Greater Visibility in SVC Usage Reporting

For Splunk Cloud customers, understanding and optimizing Splunk Virtual Compute (SVC) usage and resource ...

Automatic Discovery Part 3: Practical Use Cases

If you’ve enabled Automatic Discovery in your install of the Splunk Distribution of the OpenTelemetry ...