Splunk Search

splunk regex field extraction

Saeed-Hajitorab
New Member

Hello

i want to extract ip field from a log but i give error.

this is a part of my log: ",\"SourceIp\":\"10.10.6.0\",\"N

i want 10.10.6.0 as a field.

can you help me?

 

Labels (1)
0 Karma

PickleRick
SplunkTrust
SplunkTrust

This looks awfully close to a part of a json structure inserted as a string field in another json structure.

It is bad on at least two levels.

1) Embedding json as escaped string prevents it from being properly parsed by Splunk

2) Extracting from structured data with regexes is asking for trouble

richgalloway
SplunkTrust
SplunkTrust

What have you tried so far?  What error do you get?  Are you trying to extract the field at index-time or search-time?

Have you tried this rex command in your search?

| rex "SourceIp\\\\\\":\\\\\\"(?<SourceIp>[\d\.]+)"
---
If this reply helps you, Karma would be appreciated.
0 Karma
Career Survey
First 500 qualified respondents will receive a $20 gift card! Tell us about your professional Splunk journey.

Can’t make it to .conf25? Join us online!

Get Updates on the Splunk Community!

Community Content Calendar, September edition

Welcome to another insightful post from our Community Content Calendar! We're thrilled to continue bringing ...

Splunkbase Unveils New App Listing Management Public Preview

Splunkbase Unveils New App Listing Management Public PreviewWe're thrilled to announce the public preview of ...

Leveraging Automated Threat Analysis Across the Splunk Ecosystem

Are you leveraging automation to its fullest potential in your threat detection strategy?Our upcoming Security ...