**SPLUNK** Regular expresions perl\\ Create searches. Ad hoc: http://docs.splunk.com/Documentation/Splunk/5.0/Search/Aboutcustomsearchcommands http://docs.splunk.com/Documentation/Splunk/6.0.1/Search/Whatsinthismanual Commands: regex:\\ convert\\ eval\\ extract (kv)\\ fields\\ lookup (if not local=t)\\ mvexpand\\ multikv\\ rename\\ regex : Removes or keeps results that match the specified regular expression(streamingly). ... | regex _raw="(?=!\d)10\.\d{1,3}\.\d{1,3}\.\d{1,3}(?!\d)" (this is from the field _raw) \\ replace rex : string replacement and character substitution. search strcat tagstyper. Examples: Creates a new field called 'test' taking as key "Error adding limit institutionId:". Then it deduplicates all the members of the field and sorts them up source="ParFX-PRD-Env" host="l52prdsrv-mds1.pure.local" error | rex field=_raw "Error adding limit institutionId: (?.*)" | dedup test | sort test **EXTRACT, ORDER & TABULATE FIELDS** To extract fields that are not automatically detected: - Search. Select Source of interest, for example: source="network" - Make a sample search contained log entries with the fields we want to extract - Click on the small square box with an arrow which are in each the log entries and select //extract fields// - Fill up the text box "Example values for a field:" with some examples of the field you want to extract and click "Generate" - We can click in test, this will generate a simple table with the count and percentage of that field. index=main host="l52eatfwl-edge1" PROD-DMS created | rex field=_raw "session created (?P\\d+\\.\\d+\\.\\d+\\.\\d+)(?=/)" | dedup test | sort test | table test