Hi,
I am currently indexing bash history files. The user and other information are encapsulated in the file name when all the history files are collected.
e.g. /install/.log/20100910124129-server1.user1.user4.desktop1.domain.tld.log
I use the following EXTRACT in the props.conf:
EXTRACT-userinfo=/install/\.log/(?<LOGOUT>\d{14})-(?<CMDHOST>[^\.]+)\.(?<USER>[^\.]+)\.(?<EUSER>[^\.]+)\.(?<FORMHOST>\.+)\.log in source
On viewing the results form the search:
index=myindex
Shows all the fields in the field picker with the correct counts. When clicking on one of the fields the search changes to:
Index=myindex CMDHOST =”host1”
Shows “No matching events found”
Index=myindex CMDHOST =”*host1”
List all the events for the CMDHOST
index="myindex" | fields _raw, CMDHOST | search CMDHOST ="host1"
again lists all the events for the specific CMDHOST.
Any ideas?
BTW tested on Splunk 4.1.2 and 4.1.5 on MacOSX, Windows and FreeBSD.
... View more