Splunk Dev

extract part of a string from the fields

karthi25
Path Finder

I am having the comments field with the data below:

'ADP-ECS~FILEMANIFEST~20171228-221014~60.txt.gz and ADP-ECS~FILEMANIFEST~20171228-221014~60.txt.gz.doneTask Completed Successfully '    

'Filename is SAP-ADP~DEVICEUSAGE~20171227-005707~4596654.txt.gz and Token Name is SAP-ADP~DEVICEUSAGE~20171227-005707~4596654.txt.gz.doneTask Failed '  

'ADPT~ADPTWMFMDAILY~20171228-220124~0.txt.gz and ADPT~ADPTWMFMDAILY~20171228-220124~0.txt.gz.doneTask Completed Successfully '

Now I want to extract only the filename for eg: "ADP-ECS~FILEMANIFEST~20171228-221014~60.txt.gz" and status like below

filename                                                                                                                  status
--------------------------------------------------------------------------------------------------------------------------------------
ADP-ECS~FILEMANIFEST~20171228-221014~60.txt.gz                                  Completed
SAP-ADP~DEVICEUSAGE~20171227-005707~4596654.txt.gz                              Failed
ADPT~ADPTWMFMDAILY~20171228-220124~0.txt.gz                                     Completed   

Kindly help me to do it.

Tags (1)
0 Karma
1 Solution

Elsurion
Communicator

Ok it took a bit to create this regex for this comment.

| rex field=comment "'(Filename\sis\s)?(?<filename>\S+)\s+and\s+(Token\sName\sis\s)?(?<token>\S+)\s+((?<status>\S+)(\s\S+)?)"

This regex works on both types of comment.

View solution in original post

Elsurion
Communicator

Ok it took a bit to create this regex for this comment.

| rex field=comment "'(Filename\sis\s)?(?<filename>\S+)\s+and\s+(Token\sName\sis\s)?(?<token>\S+)\s+((?<status>\S+)(\s\S+)?)"

This regex works on both types of comment.

nickhills
Ultra Champion

This regex seems to work with your sample data.
'(Filename is\s)?(?<filename>.+?\.gz).*Task(?<status>.*)'

In a search you could run

<your search>|rex field=comment "'(Filename is\s)?(?<filename>.+?\.gz).*Task(?<status>.*)'"|table filename status
If my comment helps, please give it a thumbs up!
Get Updates on the Splunk Community!

Webinar Recap | Revolutionizing IT Operations: The Transformative Power of AI and ML ...

The Transformative Power of AI and ML in Enhancing Observability   In the realm of IT operations, the ...

.conf24 | Registration Open!

Hello, hello! I come bearing good news: Registration for .conf24 is now open!   conf is Splunk’s rad annual ...

ICYMI - Check out the latest releases of Splunk Edge Processor

Splunk is pleased to announce the latest enhancements to Splunk Edge Processor.  HEC Receiver authorization ...