Splunk Search

regex help!

kiran331
Builder

How to extract the IP OR hostname from the field "source"?

source=/opt/var/log/splunk/ciscoasa/11.12.22.345/2017_06_05_21_cisco.log
source=/opt/var/log/splunk/ciscoasa/abc_xyz/2017_06_05_21_cisco.log

I need to extract 11.12.22.345 & abc_xyz

Tags (2)
0 Karma
1 Solution

inventsekar
SplunkTrust
SplunkTrust

Hi Kiran, Verified and this works fine -

source="ciscoasa.txt" | rex field=_raw "ciscoasa\/(?<ipAddress>.*)\/" | table ipAddress _raw

alt text

thanks and best regards,
Sekar

PS - If this or any post helped you in any way, pls consider upvoting, thanks for reading !

View solution in original post

0 Karma

horsefez
Motivator

Hi,

because I was bored I made this redundant answer.

yoursearch | rex field=source "(?<host>[^\/]+)\/[^\/]+(?:$)"

gcusello
SplunkTrust
SplunkTrust

Hi kiran331,
Try this:

your_search | rex field=source "ciscoasa\/(?<host>[^\/]*)" | ...

you can test it at https://regex101.com/r/wrL9Ze/1

Bye.
giuseppe

0 Karma

inventsekar
SplunkTrust
SplunkTrust

Hi Kiran, Verified and this works fine -

source="ciscoasa.txt" | rex field=_raw "ciscoasa\/(?<ipAddress>.*)\/" | table ipAddress _raw

alt text

thanks and best regards,
Sekar

PS - If this or any post helped you in any way, pls consider upvoting, thanks for reading !
0 Karma
Career Survey
First 500 qualified respondents will receive a $20 gift card! Tell us about your professional Splunk journey.
Get Updates on the Splunk Community!

Tech Talk Recap | Mastering Threat Hunting

Mastering Threat HuntingDive into the world of threat hunting, exploring the key differences between ...

Observability for AI Applications: Troubleshooting Latency

If you’re working with proprietary company data, you’re probably going to have a locally hosted LLM or many ...

Splunk AI Assistant for SPL vs. ChatGPT: Which One is Better?

In the age of AI, every tool promises to make our lives easier. From summarizing content to writing code, ...