Splunk Search

regex returns no results

CorpusCallosum
Explorer

Hi guys

I am doing an experiment in my local splunk. I imported some http logs including attack patterns. And I am trying to list all /etc/passwd patterns.

First i tried sourcetype=X IPaddressofrequester | regex http_request="(?:etc\/\W*passwd)"

it gives correct results including the http requests have specific IP address and its /etc/passwd requests

However when i exlude the ip address and convert the search like

sourcetype=X regex http_request="(?:etc\/\W*passwd)"

it gives no result. What is wrong with this search? I am trying to list all the request including /etc/passwd in it. after that i will make table of the IP addresses sending /etc/passwd

Could you please help me on this?

Thanks

1 Solution

jtrucks
Splunk Employee
Splunk Employee

You removed the | which is needed.

Do this:

sourcetype=X  | regex http_request="(?:etc/W*passwd)"
--
Jesse Trucks
Minister of Magic

View solution in original post

jtrucks
Splunk Employee
Splunk Employee

You removed the | which is needed.

Do this:

sourcetype=X  | regex http_request="(?:etc/W*passwd)"
--
Jesse Trucks
Minister of Magic

Ayn
Legend

When you ONLY use regex to filter that means the initial search command will need to grab all the matching events from disk and into memory before passing them on to the next command in the search pipeline (regex). This is of course very "expensive" I/O-wise. You should always filter your events as much as possible in the initial search command.

CorpusCallosum
Explorer

Thanks that worked. This solution come up with a new question 🙂 if i add IPaddress to my search the results shown quickly like 10 seconds. However if use only regex it takes 5 min to show results for custom time search around 30 mins traffic. I know regex is expensive but both searches using same regex. What is the reason of that? is that normal?

0 Karma
Get Updates on the Splunk Community!

Building Reliable Asset and Identity Frameworks in Splunk ES

 Accurate asset and identity resolution is the backbone of security operations. Without it, alerts are ...

Cloud Monitoring Console - Unlocking Greater Visibility in SVC Usage Reporting

For Splunk Cloud customers, understanding and optimizing Splunk Virtual Compute (SVC) usage and resource ...

Automatic Discovery Part 3: Practical Use Cases

If you’ve enabled Automatic Discovery in your install of the Splunk Distribution of the OpenTelemetry ...