Splunk Search

rex command help...

harishalipaka
Motivator

Hi All,

my data is like below-- I want to extract when it has string ignore numbers

853727-gcplusrspcndb01.usa.corp.ad
10.198.29.5

Output:-

853727-gcplusrspcndb01
 10.198.29.5
Thanks
Harish
0 Karma

to4kawa
Ultra Champion
| rex mode=sed "s/[.a-z]*$//"
0 Karma

gcusello
SplunkTrust
SplunkTrust

Hi @harishalipaka,
try this

| rex "^\s+(?<url>[^\.]+).*\s+(?<ip>\d+\.\d+\.\d+\.\d+)"

that you can test at https://regex101.com/r/6axOMx/1

Ciao.
Giuseppe

0 Karma

harishalipaka
Motivator

Hi @gcusello

It is not working for me .am getting empty fields.

| rex field=HostName "^\s+(?<url>[^\.]+).*\s+(?<ip>\d+\.\d+\.\d+\.\d+)"
Thanks
Harish
0 Karma

gcusello
SplunkTrust
SplunkTrust

Hi @harishalipaka,
probably your row data are different, this regex is related to the information you shared, could you share an example of your row data?

Ciao.
Giuseppe

0 Karma

richgalloway
SplunkTrust
SplunkTrust

Here's one way.

... | rex "(?<field>[^\.]+)"
---
If this reply helps you, Karma would be appreciated.
0 Karma

harishalipaka
Motivator

Hi @richgalloway

I already tried this logic but it will extract like below

853727-gcplusrspcndb01
10

But i want like this

853727-gcplusrspcndb01
  10.198.29.5
Thanks
Harish
0 Karma
Get Updates on the Splunk Community!

App Platform's 2025 Year in Review: A Year of Innovation, Growth, and Community

As we step into 2026, it’s the perfect moment to reflect on what an extraordinary year 2025 was for the Splunk ...

Operationalizing Entity Risk Score with Enterprise Security 8.3+

Overview Enterprise Security 8.3 introduces a powerful new feature called “Entity Risk Scoring” (ERS) for ...

Unlock Database Monitoring with Splunk Observability Cloud

  In today’s fast-paced digital landscape, even minor database slowdowns can disrupt user experiences and ...