Monitoring Splunk

The Format of Logs changed and the Alerts are not working

n3wbi3
Loves-to-Learn Lots

So the logs changed from typical jason to this ...

 

"message":"type=\"CLIENT_LOGIN\", realmId=\"xxx\", clientId=\"xxx\", userId=\"xxx"

so splunk extracts for type this "\"

 

Now the searches do not work anymore

Labels (2)
0 Karma

gcusello
SplunkTrust
SplunkTrust

Hi @n3wbi3,

you have to create a new search using a regex to extract fields:

| rex "type\=\\\"(?<type>[^\\]+)"

the problem is that the log contains backslash and this is a provlem because in the search you have to use the above command or the following:

| rex "type\=\\\\\"(?<type>[^\\]+)"

Ciao.

Giuseppe

0 Karma
Get Updates on the Splunk Community!

Upcoming Webinar: Unmasking Insider Threats with Slunk Enterprise Security’s UEBA

Join us on Wed, Dec 10. at 10AM PST / 1PM EST for a live webinar and demo with Splunk experts! Discover how ...

.conf25 technical session recap of Observability for Gen AI: Monitoring LLM ...

If you’re unfamiliar, .conf is Splunk’s premier event where the Splunk community, customers, partners, and ...

A Season of Skills: New Splunk Courses to Light Up Your Learning Journey

There’s something special about this time of year—maybe it’s the glow of the holidays, maybe it’s the ...