Splunk Search

How can I use a subsearch as fields in my report?

qtopia7100
Explorer

This is the search I'm working with:

index="*-network" (sourcetype="cisco:asa" OR sourcetype="routers") user="user*" ("session terminated" OR "session started") | table _time, user, src_ip

I want a field that has "session terminated" OR "session started" based on which value is in the log.

0 Karma

gokadroid
Motivator

Please try this:

index="*-network" (sourcetype="cisco:asa" OR sourcetype="routers") user="user*" ("session terminated" OR "session started") 
| rex field=_raw ".*(?<sessionState>(session\s*(terminated|started))).*"
| table _time, user, src_ip, sessionState

See the extraction here

If you want to make it case insensitive like the search bar will do try (?i) in rex :

...| rex field=_raw ".*(?<sessionState>(?i)(session\s*(terminated|started))).*"| ...
0 Karma
Get Updates on the Splunk Community!

Introducing the Splunk Community Dashboard Challenge!

Welcome to Splunk Community Dashboard Challenge! This is your chance to showcase your skills in creating ...

Wondering How to Build Resiliency in the Cloud?

IT leaders are choosing Splunk Cloud as an ideal cloud transformation platform to drive business resilience,  ...

Updated Data Management and AWS GDI Inventory in Splunk Observability

We’re making some changes to Data Management and Infrastructure Inventory for AWS. The Data Management page, ...