All Apps and Add-ons

Field Extraction via Regex

raimondo_massar
New Member

Hi
I would like to list below logline in 4 parts and I'm not sure how to do it in with Regex. The automatic field extractor does not work. Any suggestion on how to write the right regex.

Field1  Field2              Field3                                 Field4
[AUDIT] [USER_AUTH_SUCCESS] Authentication successfully completed. User: 'Test'

This is an extract out of the field extractor which is not working:

?:[^[n][){3}(?P<fieldname1>[^]]+)[^ n] [(?P<fieldname2>[^]]+)](?P<fieldname3>s+w+s+w+s+w+.)^(?P<fieldname4>s+w+:)
0 Karma

jonuwz
Influencer

In that case feel free to accept the answer below. Thanks

0 Karma

raimondo_massar
New Member

Perfect ..it works. thanks very much for your help !

0 Karma

jonuwz
Influencer

Here you go :

* | head 1 
| eval message="[AUDIT] [USER_AUTH_SUCCESS] Authentication successfully completed. User: 'Test'"
| table message 
| rex field=message "\[(?<field1>[^]]+)\] \[(?<field2>[^]]+)\] (?<field3>.*)\s+User: '(?<field4>.*?)'"

Everything between the two " on the last line is the regex you need to extract the fields

i.e.

\[(?<field1>[^]]+)\] \[(?<field2>[^]]+)\] (?<field3>.*)\s+User: '(?<field4>.*?)'

raimondo_massar
New Member

it's always information about the user

0 Karma

jonuwz
Influencer

Where does Field4 start ? is it

after a '.'

or

it it always information about the user ?

0 Karma
Get Updates on the Splunk Community!

Observe and Secure All Apps with Splunk

  Join Us for Our Next Tech Talk: Observe and Secure All Apps with SplunkAs organizations continue to innovate ...

What’s New & Next in Splunk SOAR

Security teams today are dealing with more alerts, more tools, and more pressure than ever.  Join us for an ...

Observability Unlocked: Kubernetes Monitoring with Splunk Observability Cloud

 Ready to master Kubernetes and cloud monitoring like the pros? Join Splunk’s Growth Engineering team for an ...