<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: extracting fields from &amp;quot;event_message&amp;quot; &amp;quot;context: &amp;quot; portion of splunkd events on indexers? in Getting Data In</title>
    <link>https://community.splunk.com/t5/Getting-Data-In/extracting-fields-from-quot-event-message-quot-quot-context-quot/m-p/508912#M86567</link>
    <description>&lt;P&gt;Thanks &lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/214410"&gt;@isoutamo&lt;/a&gt;! The question is about a field extraction for a specific sourcetype, not the root cause of the event. I have yet to dig into it - but looks like these "&lt;SPAN class="t"&gt;Failed&lt;/SPAN&gt; &lt;SPAN class="t"&gt;to&lt;/SPAN&gt; &lt;SPAN class="t"&gt;parse&lt;/SPAN&gt; &lt;SPAN class="t"&gt;timestamp&lt;/SPAN&gt; &lt;SPAN class="t"&gt;in&lt;/SPAN&gt; &lt;SPAN class="t"&gt;first&lt;/SPAN&gt; &lt;SPAN class="t h"&gt;&lt;SPAN class="t"&gt;MAX_TIMESTAMP&lt;/SPAN&gt;_&lt;SPAN class="t"&gt;LOOKAHEAD&lt;/SPAN&gt;&lt;/SPAN&gt;" errors are happening in several places (hosts, sourcetypes) and will have to be dealt with separately and individually. For now, I just need a "best practice" on how to get those fields out of the "Context" portion of those errors. Thanks again.&lt;/P&gt;</description>
    <pubDate>Mon, 13 Jul 2020 20:44:45 GMT</pubDate>
    <dc:creator>mitag</dc:creator>
    <dc:date>2020-07-13T20:44:45Z</dc:date>
    <item>
      <title>extracting fields from "event_message" "context: " portion of splunkd events on indexers?</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/extracting-fields-from-quot-event-message-quot-quot-context-quot/m-p/508884#M86563</link>
      <description>&lt;P&gt;in splunkd events on indexers such as this:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;07-13-2020 11:42:03.337 -0700 WARN DateParserVerbose - Failed to parse timestamp in first MAX_TIMESTAMP_LOOKAHEAD (128) characters of event. Defaulting to timestamp of previous event (Mon Jul 13 11:42:02 2020). Context: source=/Library/Application Support/Symantec/Silo/NFM/LiveUpdate/Logs/lux.log|host=mac_mini04|symantec:silo:NFM=LiveUpdate:lux|233394&lt;/LI-CODE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;host = splunk_indexer_01 | source = /opt/splunk/var/log/splunk/splunkd.log | sourcetype = splunkd&lt;/LI-CODE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;... it does not look like fields in the "Context: " portion of the events are extracted:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;Context: source=/Library/Application Support/Symantec/Silo/NFM/LiveUpdate/Logs/lux.log|host=bpa-mit-mini04|symantec:silo:NFM=LiveUpdate:lux|233394&lt;/LI-CODE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Do I need to manually extract them via rex? If so - has anyone done this and could perhaps share a template rex command for this event type? If not, what's the best practice?&lt;/P&gt;&lt;P&gt;Thank you!&lt;/P&gt;&lt;P&gt;P.S. Something like this?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;index=_internal sourcetype=splunkd  "Context: "
| rex field=event_message "Context\:\s+(?P&amp;lt;Context&amp;gt;source\=(?P&amp;lt;context_source&amp;gt;\S+?)?[\||$]host\=(?P&amp;lt;context_host&amp;gt;\S+?)(?:\|(?P&amp;lt;context_tail&amp;gt;.*))$)"&lt;/LI-CODE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 13 Jul 2020 20:47:07 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/extracting-fields-from-quot-event-message-quot-quot-context-quot/m-p/508884#M86563</guid>
      <dc:creator>mitag</dc:creator>
      <dc:date>2020-07-13T20:47:07Z</dc:date>
    </item>
    <item>
      <title>Re: extracting fields from "event_message" "context: " portion of splunkd events on indexers?</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/extracting-fields-from-quot-event-message-quot-quot-context-quot/m-p/508895#M86566</link>
      <description>&lt;P&gt;Basically this error means that splunk couldn’t recognize valid time stamp on your event within 128 character from beginning of event.&amp;nbsp;&lt;BR /&gt;Can you send sample events and your inputs, props and possible transformations.conf files?&lt;/P&gt;&lt;P&gt;r. Ismo&lt;/P&gt;</description>
      <pubDate>Mon, 13 Jul 2020 19:24:17 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/extracting-fields-from-quot-event-message-quot-quot-context-quot/m-p/508895#M86566</guid>
      <dc:creator>isoutamo</dc:creator>
      <dc:date>2020-07-13T19:24:17Z</dc:date>
    </item>
    <item>
      <title>Re: extracting fields from "event_message" "context: " portion of splunkd events on indexers?</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/extracting-fields-from-quot-event-message-quot-quot-context-quot/m-p/508912#M86567</link>
      <description>&lt;P&gt;Thanks &lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/214410"&gt;@isoutamo&lt;/a&gt;! The question is about a field extraction for a specific sourcetype, not the root cause of the event. I have yet to dig into it - but looks like these "&lt;SPAN class="t"&gt;Failed&lt;/SPAN&gt; &lt;SPAN class="t"&gt;to&lt;/SPAN&gt; &lt;SPAN class="t"&gt;parse&lt;/SPAN&gt; &lt;SPAN class="t"&gt;timestamp&lt;/SPAN&gt; &lt;SPAN class="t"&gt;in&lt;/SPAN&gt; &lt;SPAN class="t"&gt;first&lt;/SPAN&gt; &lt;SPAN class="t h"&gt;&lt;SPAN class="t"&gt;MAX_TIMESTAMP&lt;/SPAN&gt;_&lt;SPAN class="t"&gt;LOOKAHEAD&lt;/SPAN&gt;&lt;/SPAN&gt;" errors are happening in several places (hosts, sourcetypes) and will have to be dealt with separately and individually. For now, I just need a "best practice" on how to get those fields out of the "Context" portion of those errors. Thanks again.&lt;/P&gt;</description>
      <pubDate>Mon, 13 Jul 2020 20:44:45 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/extracting-fields-from-quot-event-message-quot-quot-context-quot/m-p/508912#M86567</guid>
      <dc:creator>mitag</dc:creator>
      <dc:date>2020-07-13T20:44:45Z</dc:date>
    </item>
    <item>
      <title>Re: extracting fields from "event_message" "context: " portion of splunkd events on indexers?</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/extracting-fields-from-quot-event-message-quot-quot-context-quot/m-p/508928#M86571</link>
      <description>&lt;P&gt;Sorry that ;-( I should read the whole message and think little bit more before answer.&lt;/P&gt;&lt;P&gt;you could try the next one&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;PRE&gt;...&lt;BR /&gt;| rex "Context:\s+(?&amp;lt;context&amp;gt;.*)"&lt;BR /&gt;| rex field=context max_match=0 "source=(?&amp;lt;context_source&amp;gt;[^\|]+)|host=(?&amp;lt;context_host&amp;gt;[^\|]+)"&lt;/PRE&gt;</description>
      <pubDate>Mon, 13 Jul 2020 22:11:31 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/extracting-fields-from-quot-event-message-quot-quot-context-quot/m-p/508928#M86571</guid>
      <dc:creator>isoutamo</dc:creator>
      <dc:date>2020-07-13T22:11:31Z</dc:date>
    </item>
    <item>
      <title>Re: extracting fields from "event_message" "context: " portion of splunkd events on indexers?</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/extracting-fields-from-quot-event-message-quot-quot-context-quot/m-p/508939#M86572</link>
      <description>&lt;P&gt;Thank you! Much cleaner than mine.&lt;/P&gt;</description>
      <pubDate>Mon, 13 Jul 2020 22:32:00 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/extracting-fields-from-quot-event-message-quot-quot-context-quot/m-p/508939#M86572</guid>
      <dc:creator>mitag</dc:creator>
      <dc:date>2020-07-13T22:32:00Z</dc:date>
    </item>
  </channel>
</rss>

