Splunk Search

Single line of regex to extract multiple fields

token1
Explorer

I've seen the TA Unified2 do this, one single line of regex pulling all relevant fields from snort logs.  I'm wanting to do the same thing for some NetApp logs I have:

The regex101 URL is:  https://regex101.com/r/zlhxN9/1/

It has pretty good test data.  The first line is a very typical format.  The second line has a doozy, when an operation is carried out there is a field between the "::" delimitators that is further broken up with "<>" delimitators. 

I'm at a loss here as you can see in the regex101 URL.

Labels (1)
0 Karma

ITWhisperer
SplunkTrust
SplunkTrust

I am not sure what the question is here. Please can you explain further?

0 Karma
Get Updates on the Splunk Community!

Splunk Enterprise Security(ES) 7.3 is approaching the end of support. Get ready for ...

Hi friends!    At Splunk, your product success is our top priority. With Enterprise Security (ES), we're here ...

Splunk Enterprise Security 8.x: The Essential Upgrade for Threat Detection, ...

Watch On Demand the Tech Talk, and empower your SOC to reach new heights! Duration: 1 hour  Prepare to ...

Splunk Observability for AI

Don’t miss out on an exciting Tech Talk on Splunk Observability for AI!Discover how Splunk’s agentic AI ...