Splunk Search

extract source_ip

tven7
Path Finder

i have the following jboss http log entry

00.00.00.253 11.11.111.111 [27/Sep/2011:00:45:31 -0700] GET /xyz/images/spacer.png HTTP/1.1 'Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.0; WOW64; Trident/4.0; GTB7.1; SLCC1; .NET CLR 2.0.50727; Media Center PC 5.0; .NET CLR 3.5.30729; .NET CLR 1.1.4322; .NET4.0C; .NET CLR 3.0.30729)' 200 153 0

rex ="[\d+\.]+\s(?P<source_ip>[\d+\.]+)\s\[\d+"

I already tried specifying sourcetype as access_combined. splunk does not want to recognize the format correctly. So i am forced to extract with regex.

this wont work right for some reason and i cant extract source_ip. I am going after the 2nd ip on the line. what am i doing wrong?

0 Karma
1 Solution

cnk
Path Finder

Try removing the '=' before your regex. The rex command syntax is:

rex [field=<field>] (<regex-expression> [max_match=<int>] | mode=sed <sed-expression>)

hence

rex "[\d+\.]+\s(?P<source_ip>[\d+\.]+)\s\[\d+"

View solution in original post

tven7
Path Finder

Thank you. That fixed it. 🙂

0 Karma

cnk
Path Finder

Try removing the '=' before your regex. The rex command syntax is:

rex [field=<field>] (<regex-expression> [max_match=<int>] | mode=sed <sed-expression>)

hence

rex "[\d+\.]+\s(?P<source_ip>[\d+\.]+)\s\[\d+"
Get Updates on the Splunk Community!

New Year. New Skills. New Course Releases from Splunk Education

A new year often inspires reflection—and reinvention. Whether your goals include strengthening your security ...

Splunk and TLS: It doesn't have to be too hard

Overview Creating a TLS cert for Splunk usage is pretty much standard openssl.  To make life better, use an ...

Faster Insights with AI, Streamlined Cloud-Native Operations, and More New Lantern ...

Splunk Lantern is a Splunk customer success center that provides practical guidance from Splunk experts on key ...