Getting Data In

How do i extract data from my event source filename

pradiptam
Explorer

I have multiple logfiles like TEST_SRC_FR.txt, TEST_SRC_IN.txt, TEST_SRC_AU.txt which are my source files. Now i want to extract the last two letters like "FR" from TEST_SRC_FR.txt.

Any idea how to get them during search time.

Regards,

Pradipta

0 Karma

Richfez
SplunkTrust
SplunkTrust

Sure!

... | rex field=source "(?<LastTwoLetters>..)\.txt$"

That assume they're the literal field source and that they ALWAYS end with "txt".

Modifications can be made for other similar scenarios, but you'll have to be very specific in describing them. 🙂

Happy Splunking,
Rich

pradiptam
Explorer

Thanks its also working, checking which one to use in my program

Regards,
Pradipta

0 Karma

493669
Super Champion

try this run anywhere search:

| makeresults |eval _raw="TEST_SRC_FR.txt"|rex ".*_(?<name>\w{2})"

in your case you can use as

index=<indexname>| rex field=source ".*_(?<name>\w{2})"

also you can make this regex in props.conf

pradiptam
Explorer

Great its working fine for me.

regards,
Pradipta

0 Karma
Got questions? Get answers!

Join the Splunk Community Slack to learn, troubleshoot, and make connections with fellow Splunk practitioners in real time!

Meet up IRL or virtually!

Join Splunk User Groups to connect and learn in-person by region or remotely by topic or industry.

Get Updates on the Splunk Community!

Announcing Modern Navigation: A New Era of Splunk User Experience

We are excited to introduce the Modern Navigation feature in the Splunk Platform, available to both cloud and ...

Modernize your Splunk Apps – Introducing Python 3.13 in Splunk

We are excited to announce that the upcoming releases of Splunk Enterprise 10.2.x and Splunk Cloud Platform ...

Step into “Hunt the Insider: An Splunk ES Premier Mystery” to catch a cybercriminal ...

After a whole week of being on call, you fell asleep on your keyboard, and you hit a sequence of buttons that ...