- Mark as New
- Bookmark Message
- Subscribe to Message
- Mute Message
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
create alert
vineela
Path Finder
09-29-2021
02:53 AM
Hi All,
I have logs in splunk and i need to create field values and create table with the values,present in logs.
example :Caused by: org.apache.kafka.connect.errors.ConnectException: Failed to start new JMS session connection 1: JMSWMQ2013: The security authentication was not valid that was supplied for queue manager 'EVT302' with connection mode 'Client' and host name '10.37.84.12,10.37.100.13(1442)'.
Above one is the example log and i need to extract value under caused by as description and queue manager number and also the hostname.
Can anyone help me on the same.
Thanks in Advance.
- Mark as New
- Bookmark Message
- Subscribe to Message
- Mute Message
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
ITWhisperer

SplunkTrust
09-29-2021
03:03 AM
| rex "Caused by: (?<cause>([^:]+:){3}).*queue manager '(?<queuemanager>[^']+).*host name '(?<hostname>[^']+)"
