Splunk Search

how to use OR in the field extract

perlish
Communicator

hi, i want extract a field like this.
User xuy on SCVPN LGSSLVPN logs on from
authentication response to L2TPD module for user xuy

these are two logs, I want extract LGSSLVPN or L2TPD

I use "(?i) authentication response to |(?i) User .* on SCVPN (?P<FIELDNAME>[^ ]+)"
but it's wrong.

Tags (2)
0 Karma

lguinn2
Legend

There are a couple of ways to do this. The easiest is to split it into two field extractions that just happen to extract the same field name.

If you are extracting in props.conf, it would look like this:

[yoursourcetypehere]
EXTRACT-e1=(?i) authentication response to (?P<FIELDNAME>\S+)
EXTRACT-e2=(?i) User .* on SCVPN (?P<FIELDNAME>\S+)

Notice that I also simplified your [^ ]+ to \S, which means "one or more non-whitespace characters".

The (?i) means "case insensitive search" so I don't know if you actually need that either.

If you are extracting using the rex command, you can simply string two rex commands together.

yoursearchhere 
| rex "(?i) authentication response to (?P<FIELDNAME>\S+)" 
| rex "(?i) User .* on SCVPN (?P<FIELDNAME>\S+)"
| stats or whatever you want to do here

But if you truly must combine it into one icky regular expression, this should work:

(?i) (?:authentication response to |User .* on SCVPN )(?P<FIELDNAME>[^ ]+)

perlish
Communicator

yes, it has solve my issue, thank you.

0 Karma
Get Updates on the Splunk Community!

Tips & Tricks When Using Ingest Actions

Tune in to learn about:Large scale architecture when using Ingest ActionsRegEx performance considerations ...

Announcing Our Splunk MVPs

We are excited to announce the first cohort of the Splunk MVP program. Splunk MVPs are passionate members of ...

Dashboard Studio Challenge - Learn New Tricks, Showcase Your Skills, and Win Prizes!

Reimagine what you can do with your dashboards. Dashboard Studio is Splunk’s newest dashboard builder to ...