Solved

Excel Search applied to a URL

Posted on 2014-03-25
3
275 Views
Last Modified: 2014-03-25
I am attempting to search this URL "http://image.its.nv.gov:8082/WME_-_I580_at_I80_N_E_/image" to trim a portion of the location information.  I want to remove "http://image.its.nv.gov:8082/" and "/image" to obtain the "WME_-_I580_at_I80_N_E_" location information.  

I developed the following formula:  "=MID(A1,SEARCH("/",A1,8)+1,SEARCH("/image",A1)-SEARCH("/",A1,8)-1)"

This appears to work with my other locations such "http://lexus8.nvfast.org:8082/WME_-_I-15_SB_N_of_Primm/image" but does not work with anything starting with "http://image.its.nv.gov:8082/WME_-_I580_at_I80_N_E_/image".  I believe the problem is with the double "/image" in the URL.  

Sample URLS:  

http://image.its.nv.gov:8082/WME_-_I580_at_I80_N_E_/image
http://image.its.nv.gov:8082/WME_-_I580_at_I80_S_W_/image
http://image.its.nv.gov:8082/WME_-_I580_at_Kietzke_Lane/image
http://image.its.nv.gov:8082/WME_-_I580_at_Glendale_Ave/image
http://lexus6.nvfast.org:8083/WME_-_Eastern_and_Flamingo/image
http://lexus6.nvfast.org:8083/WME_-_Eastern_and_Tropicana_/image
http://lexus6.nvfast.org:8083/WME_-_Eastern_and_Sunset/image
http://lexus6.nvfast.org:8083/WME_-_Russell_and_Paradise/image

Current Excel Formula:  =MID(A1,SEARCH("/",A1,8)+1,SEARCH("/image",A1)-SEARCH("/",A1,8)-1)

Desired output:

WME_-_I580_at_I80_N_E
WME_-_I580_at_I80_S_W_
WME_-_I580_at_Kietzke_Lane
WME_-_I580_at_Glendale_Ave
WME_-_Eastern_and_Flamingo
WME_-_Eastern_and_Tropicana_
WME_-_Eastern_and_Sunset
WME_-_Russell_and_Paradise

Any help would be appreciated?
0
Comment
Question by:Israel Anthony Lopez
  • 2
3 Comments
 
LVL 39

Accepted Solution

by:
nutsch earned 500 total points
Comment Utility
Try

=MID(LEFT(A1,LEN(A1)-6),1+FIND("/",A1,8),LEN(A1))
0
 
LVL 1

Author Closing Comment

by:Israel Anthony Lopez
Comment Utility
Great job!  This resolved my issue.
0
 
LVL 39

Expert Comment

by:nutsch
Comment Utility
Glad to help.

Thomas
0

Featured Post

Why You Should Analyze Threat Actor TTPs

After years of analyzing threat actor behavior, it’s become clear that at any given time there are specific tactics, techniques, and procedures (TTPs) that are particularly prevalent. By analyzing and understanding these TTPs, you can dramatically enhance your security program.

Join & Write a Comment

If you’re thinking to yourself “That description sounds a lot like two people doing the work that one could accomplish,” you’re not alone.
Although it can be difficult to imagine, someday your child will have a career of his or her own. He or she will likely start a family, buy a home and start having their own children. So, while being a kid is still extremely important, it’s also …
The viewer will learn how to use a discrete random variable to simulate the return on an investment over a period of years, create a Monte Carlo simulation using the discrete random variable, and create a graph to represent the possible returns over…
This Micro Tutorial will demonstrate how to use a scrolling table in Microsoft Excel using the INDEX function.

772 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

12 Experts available now in Live!

Get 1:1 Help Now