Getting Data In

How can I remove some parenthesis from this log?

daniel333
Builder

All,

I am trying to convert some superfluous parenthesis from this log. Duration value can be up to 4 digits.

Looks like
1/2/2017 12:34 severity=INFO post call (duration=5)

What I want
1/2/2017 12:34 severity=INFO post call duration=5

Here is what I got so far, but not clicking.
SEDCMD-log4jwild_fix_duration_parenth = s/((duration=(0-9)*))/\1/

Any ideas?

0 Karma

mayurr98
Super Champion

Try this run anywhere search, below will look only for duration fieldand remove the brackets from duration field only.

| makeresults 
| eval data="1/2/2017 12:34 severity=INFO post call (duration=5)" 
| rex field=data mode=sed "s/\((duration=[^\)]+)\)/\1/"

Here is what you should write in your environment:

SEDCMD-log4jwild_fix_duration_parenth = s/\((duration=[^\)]+)\)/\1/

let me know if this helps!

0 Karma

ddrillic
Ultra Champion

What about a sed command which would replace either ( or ) with nothing?

0 Karma

493669
Super Champion

have you tried below answer.. it will remove ( and )

0 Karma

493669
Super Champion

Try this:

SEDCMD-log4jwild_fix_duration_parenth = s/([^\(]+)\(([^\)]+)\)/\1\2/
0 Karma
Get Updates on the Splunk Community!

Splunk and TLS: It doesn't have to be too hard

Overview Creating a TLS cert for Splunk usage is pretty much standard openssl.  To make life better, use an ...

Faster Insights with AI, Streamlined Cloud-Native Operations, and More New Lantern ...

Splunk Lantern is a Splunk customer success center that provides practical guidance from Splunk experts on key ...

Splunk Enterprise Security: Your Command Center for PCI DSS Compliance

Every security professional knows the drill. The PCI DSS audit is approaching, and suddenly everyone's asking ...