Splunk Search

instr in Splunk ?

kp_pl
Path Finder

Below is one of my fields. Quite complex,  I know It could be divided to more atomic values .. but it is not 😞

[AuditingPipelinePair, AuditingPipelinePair_response, AuditResponse, RESPONSE] [[
Tag = AUDIT-SUCCESS
Subject = "TAR_ID":"72503", "YEAR":"2106", "EQ_TY":"STD"
BXB ServiceTus TransactionId = sb-W10nXQte_ORf6PjJ4wQ#000000004
Message ID = afa9613.62eeaf42.N6b.1405404bdw7.N7e14
Service Ref = KlmSpsDictanaryS1/proxy/KlmSpsDictanary
Operation = getShareEquip
Protocol = KTTP
Client Address = 11.232.189.10
TransportDevel User = <anonymous>
MessageDevel User = dkd
Message Pode = 0
Payload = Dipis sb-W10wXDte_ORf6PjJde34wQ0004
]]

Anyway, some of (single Strings) values splunk separated automatically like Protocol or Operation. But how to extract (or even eval in query) parameter with space like  "MessageDevel User"  or "ClientAddress" ?

Labels (1)
0 Karma
1 Solution

ITWhisperer
SplunkTrust
SplunkTrust

You could use rex, something like this

| rex "MessageDevel User = (?<MessageDevelUser>\S+)"

View solution in original post

glc_slash_it
Path Finder

Not quite sure what you're asking but, there are several things you can do there:

If fields like "Client Address" are not extracted, you can do a rex command and then use the extracted fields in evals etc:

| rex "Client Address = (?<address>\d{1,3}.\d{1,3}.\d{1,3}.\d{1,3})"
| eval address = ...

If they are already extracted, but the field as a space you can do either:

| rename "Client Address" as ClientAddress
|eval ClientAddress = ...
or
| eval "Client Address" = ...

 

0 Karma

ITWhisperer
SplunkTrust
SplunkTrust

You could use rex, something like this

| rex "MessageDevel User = (?<MessageDevelUser>\S+)"

kp_pl
Path Finder

Would you look at Payload parameter. Result has many strings with spaces.

0 Karma

kp_pl
Path Finder

I feel it could be a good solution but how to use it ?  Should I extract new field with this regex ? 

0 Karma

kp_pl
Path Finder

ok, got it !  Works perfect 🙂

 

 

0 Karma
Get Updates on the Splunk Community!

Building Reliable Asset and Identity Frameworks in Splunk ES

 Accurate asset and identity resolution is the backbone of security operations. Without it, alerts are ...

Cloud Monitoring Console - Unlocking Greater Visibility in SVC Usage Reporting

For Splunk Cloud customers, understanding and optimizing Splunk Virtual Compute (SVC) usage and resource ...

Automatic Discovery Part 3: Practical Use Cases

If you’ve enabled Automatic Discovery in your install of the Splunk Distribution of the OpenTelemetry ...