Dashboards & Visualizations

How to remove the field from raw data

aditsss
Motivator

Hi Team,

I have one requirement.

I have raw logs as shown below:

2021-02-12 09:22:32,936 INFO [ Web -4092] AuthenticationFilter Attempting request for (<asriva22><lgposputb500910.ghp.bcp.com><CN=lgposputb50010.ghp.aexp.com, OU=Middleware Utilities, O=ABC  Company, L=Phoenix, ST=Arizona

 

2021-02-12 09:22:38,689 INFO [ Web -4099] o.a.n.w.s.AuthenticationFilter Authentication success for smennen

 

2021-02-12 08:45:05,277 INFO [Web -3253] o.a.n.w.s.AuthenticationFilter Attempting request for (<JWT token>) GET https://ebac/api/flow/controller/bulletins

I want to remove highlighted time from the logs.

How can I do that.

Thanks in Advance

Labels (3)
0 Karma
1 Solution

ITWhisperer
SplunkTrust
SplunkTrust
| rex mode=sed "s/^.*INFO/INFO/g"

View solution in original post

jotne
Builder

 

 

| rex mode=sed "s/.*?,[0-9]+ //"

Try som like this (non greedy to stop after first , with number behind)

ITWhisperer
SplunkTrust
SplunkTrust
| rex mode=sed "s/^.*INFO/INFO/g"

aditsss
Motivator

@ITWhisperer 

 

It will not only be INFO it could be ERROR as well in raw logs

Can you help me with the regex.

Thanks in advance.

0 Karma

bowesmana
SplunkTrust
SplunkTrust

@aditsss 

Either of these are valid

| rex mode=sed "s/^[^ ]* [^ ]* //"
| rex mode=sed "s/^\d{4}-\d{2}-\d{2} \d{2}:\d{2}:\d{2},\d+ //"

 be careful using .* as it will be greedy, so if you have a matching pattern at the end of the data, you will lose the line up to that point.

First is just delineating by the date/time which have trailing spaces and the second is stricter in matching the date/time format as shown. 

 

Got questions? Get answers!

Join the Splunk Community Slack to learn, troubleshoot, and make connections with fellow Splunk practitioners in real time!

Meet up IRL or virtually!

Join Splunk User Groups to connect and learn in-person by region or remotely by topic or industry.

Get Updates on the Splunk Community!

Build the Future of Agentic AI: Join the Splunk Agentic Ops Hackathon

AI is changing how teams investigate incidents, detect threats, automate workflows, and build intelligent ...

[Puzzles] Solve, Learn, Repeat: Character substitutions with Regular Expressions

This challenge was first posted on Slack #puzzles channelFor BORE at .conf23, we had a puzzle question which ...

Splunk Community Badges!

  Hey everyone! Ready to earn some serious bragging rights in the community? Along with our existing badges ...