<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: How to extract errorCode and errorDescription from my events? in Splunk Search</title>
    <link>https://community.splunk.com/t5/Splunk-Search/How-to-extract-errorCode-and-errorDescription-from-my-events/m-p/273821#M82605</link>
    <description>&lt;P&gt;Since in your sample data both events (I am assuming event split at date time) have errorCode and errorDescription in different sequences,  once errorCode followed by errorDescription and then in other event in vice versa sequence, hence try this below:&lt;/P&gt;

&lt;P&gt;1) rex out your error code and error description as multivalue field:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;your Base query that returns the above two events
| rex max_match=0 field=_raw "\"errorCode\":\"(?&amp;lt;errorCode&amp;gt;[^\"]+)\""
| rex max_match=0 field=_raw "\"errorDescription\":\"(?&amp;lt;errorDesc&amp;gt;[^\"]+)\""
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;2) Zip these multivalue fields in myField so you end up with values like myField=(errorCode1,errorDesc1 ) and then expand the field&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;| eval myField=mvzip( errorCode, errorDesc)
| mvexpand myField
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;3) Using the "," as delimiter in myField, split up the values again as errC and errD and then table them.&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;|makemv myField delim=","
| eval errC=mvindex(myField, 0)
| eval errD=mvindex(myField, 1)
| table errC, errD
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;Full blown query here:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;    yourBaseQuery
| rex max_match=0 field=_raw "\"errorCode\":\"(?[^\"]+)\""
| rex max_match=0 field=_raw "\"errorDescription\":\"(?[^\"]+)\""
| eval myField=mvzip( errorCode, errorDesc)
| mvexpand myField
|makemv myField delim=","
| eval errC=mvindex(myField, 0)
| eval errD=mvindex(myField, 1)
| table errC, errD
&lt;/CODE&gt;&lt;/PRE&gt;</description>
    <pubDate>Thu, 27 Oct 2016 05:21:15 GMT</pubDate>
    <dc:creator>gokadroid</dc:creator>
    <dc:date>2016-10-27T05:21:15Z</dc:date>
    <item>
      <title>How to extract errorCode and errorDescription from my events?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-extract-errorCode-and-errorDescription-from-my-events/m-p/273819#M82603</link>
      <description>&lt;P&gt;Hi ,&lt;/P&gt;

&lt;P&gt;We need to extract few fields from below log events, these may look like JSON format.&lt;BR /&gt;
Looking to extract Error code and error description from below events, we tried and unsuccessful.&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;2016-10-25 12:33:31,926 [http-00000:13111-2] INFO [org.apache.cxf.interceptor.LoggingInInterceptor ?] Inbound Message ---------------------------- 
ID: 18 Response-Code: 200
Encoding: UTF-8 
Content-Type: application/json;charset=UTF-8
Headers: {content-type=[application/json;charset=UTF-8], Date=[Tue, 25 Oct 2016 17:33:30 GMT], Expires=[Thu, 01 Jan 1970 00:00:00 GMT], Set-Cookie=[BrowserId=L8p9Eij0T4Sfp-INSP9zDw;Path=/;Domain=.salesforce;Expires=Sat, 24-Dec-2016 17:33:30 GMT], transfer-encoding=[chunked]} 

Payload: {"responseCode":"201","messageId":"704c8163-13d4-42b8-a684-94b9d23e849e",
"lead":[{"responseCode":"201","leadID":null,"errors":[{"errorField":"head","errorDescription":"The value of email is invalid.","errorCode":"Value_Invalid_E400"},{"errorField":"bestTimeToContact","errorDescription":"The value of bestTimeToContact is invalid.","errorCode":"Value_Invalid_E400"}]}]} 
----------------------------------------------------------------------------------------------------------------------------------------------------------------------------
2016-10-25 12:33:31,986 [http-000000:13111-2] INFO [org.apache.cxf.interceptor.LoggingOutInterceptor ?] Outbound Message --------------------------- 
ID: 17 
Response-Code: 200 
Content-Type: application/json
Headers: {Content-Type=[application/json], Date=[Tue, 25 Oct 2016 17:33:31 GMT]}
Payload: {"errors":[{"errorCode":"Value_Invalid_E400","errorDescription":"The value of email is invalid.","errorField":"head"},{"errorCode":"Value_Invalid_E400","errorDescription":"The value of bestTimeToContact is invalid.","errorField":"bestTimeToContact"}]} --------------------------------------
Collapse
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;&lt;STRONG&gt;Tried below command to extract but unsuccessful:&lt;/STRONG&gt;&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;    | rex max_match=0 "errorCode\"\:\s\"(?P&amp;lt;error_code&amp;gt;[^\"])+" | rex max_match=0 "errorDescription\"\:\s\"(?P&amp;lt;error_desc&amp;gt;[^\"])+"    
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;Thanks&lt;/P&gt;</description>
      <pubDate>Wed, 26 Oct 2016 19:44:24 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-extract-errorCode-and-errorDescription-from-my-events/m-p/273819#M82603</guid>
      <dc:creator>splunker9999</dc:creator>
      <dc:date>2016-10-26T19:44:24Z</dc:date>
    </item>
    <item>
      <title>Re: How to extract errorCode and errorDescription from my events?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-extract-errorCode-and-errorDescription-from-my-events/m-p/273820#M82604</link>
      <description>&lt;P&gt;Try like this&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;your base search |rex max_match=0 "errorDescription\"\:\"(?&amp;lt;errorDescription&amp;gt;[^\"]+).+errorCode\"\:\"(?&amp;lt;errorCode&amp;gt;[^\"]+)"
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;See the regex101 validation &lt;A href="https://regex101.com/r/BxjoRR/1"&gt;https://regex101.com/r/BxjoRR/1&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 26 Oct 2016 19:50:51 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-extract-errorCode-and-errorDescription-from-my-events/m-p/273820#M82604</guid>
      <dc:creator>somesoni2</dc:creator>
      <dc:date>2016-10-26T19:50:51Z</dc:date>
    </item>
    <item>
      <title>Re: How to extract errorCode and errorDescription from my events?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-extract-errorCode-and-errorDescription-from-my-events/m-p/273821#M82605</link>
      <description>&lt;P&gt;Since in your sample data both events (I am assuming event split at date time) have errorCode and errorDescription in different sequences,  once errorCode followed by errorDescription and then in other event in vice versa sequence, hence try this below:&lt;/P&gt;

&lt;P&gt;1) rex out your error code and error description as multivalue field:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;your Base query that returns the above two events
| rex max_match=0 field=_raw "\"errorCode\":\"(?&amp;lt;errorCode&amp;gt;[^\"]+)\""
| rex max_match=0 field=_raw "\"errorDescription\":\"(?&amp;lt;errorDesc&amp;gt;[^\"]+)\""
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;2) Zip these multivalue fields in myField so you end up with values like myField=(errorCode1,errorDesc1 ) and then expand the field&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;| eval myField=mvzip( errorCode, errorDesc)
| mvexpand myField
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;3) Using the "," as delimiter in myField, split up the values again as errC and errD and then table them.&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;|makemv myField delim=","
| eval errC=mvindex(myField, 0)
| eval errD=mvindex(myField, 1)
| table errC, errD
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;Full blown query here:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;    yourBaseQuery
| rex max_match=0 field=_raw "\"errorCode\":\"(?[^\"]+)\""
| rex max_match=0 field=_raw "\"errorDescription\":\"(?[^\"]+)\""
| eval myField=mvzip( errorCode, errorDesc)
| mvexpand myField
|makemv myField delim=","
| eval errC=mvindex(myField, 0)
| eval errD=mvindex(myField, 1)
| table errC, errD
&lt;/CODE&gt;&lt;/PRE&gt;</description>
      <pubDate>Thu, 27 Oct 2016 05:21:15 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-extract-errorCode-and-errorDescription-from-my-events/m-p/273821#M82605</guid>
      <dc:creator>gokadroid</dc:creator>
      <dc:date>2016-10-27T05:21:15Z</dc:date>
    </item>
    <item>
      <title>Re: How to extract errorCode and errorDescription from my events?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-extract-errorCode-and-errorDescription-from-my-events/m-p/273822#M82606</link>
      <description>&lt;P&gt;Hi splunker9999,&lt;BR /&gt;
Maybe I don't understand what is your problem, but with these regexes you can extract your fields:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;| rex "errorCode\"\:\"(?&amp;lt;errorCode&amp;gt;[^\"]*)" | rex "errorDescription\"\:\"(?&amp;lt;errorDescription&amp;gt;[^\"]*)"
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;maybe the problem could be that in every event you have more values for each field.&lt;BR /&gt;
Bye.&lt;BR /&gt;
Giuseppe&lt;/P&gt;</description>
      <pubDate>Fri, 28 Oct 2016 12:41:38 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-extract-errorCode-and-errorDescription-from-my-events/m-p/273822#M82606</guid>
      <dc:creator>gcusello</dc:creator>
      <dc:date>2016-10-28T12:41:38Z</dc:date>
    </item>
    <item>
      <title>Re: How to extract errorCode and errorDescription from my events?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-extract-errorCode-and-errorDescription-from-my-events/m-p/273823#M82607</link>
      <description>&lt;P&gt;Hi @splunker9999 - Looks like you have some good feedback about your question below. If one of the answers helped to provide a working solution, please don't forget to click "Accept" below the best answer to resolve this post. If no, please leave a comment with some feedback so someone can try to help more. Thanks!&lt;/P&gt;</description>
      <pubDate>Tue, 08 Nov 2016 02:09:47 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-extract-errorCode-and-errorDescription-from-my-events/m-p/273823#M82607</guid>
      <dc:creator>aaraneta_splunk</dc:creator>
      <dc:date>2016-11-08T02:09:47Z</dc:date>
    </item>
  </channel>
</rss>

