Splunk Enterprise

Field extraction, string after last colon

indeed_2000
Motivator

I have log file like this,want with regex extract everything after last colon in each line

input:

2020-06-28 15:03:32,710 ERROR In--111111 [Processor] FATAL: exception in process: javax.RollbackException: ARJUNA016053: Could not commit.

 2020-06-28 14:24:41,322 ERROR In--111111[Processor] FATAL: exception in process: [GG_010] Failed >> 0060:  required to perform this operation (extended persistence context).

2020-06-28 15:03:32,710 ERROR In--111111 [Processor] FATAL: exception in process: javax.RollbackException: ARJUNA016053:Could not update.

2020-06-28 12:08:21,777 ERROR in-app-9999999 [Service] authorize: org.closed.PropertyAccessException: Null value was assigned to a property [class co.domain.entity] of primitive type setter of domain.entity.

2020-06-28 15:03:32,710 ERROR In: Could not commit.

2020-06-28 15:03:32,: 71::0 :ERROR :In: not commit.

 

output:

Could not commit

required to perform this operation (extended persistence context)

Could not update

Null value was assigned to a property [class co.domain.entity] of primitive type setter of domain.entity.

Could not commit.

not commit.


Thanks

Tags (3)
0 Karma
1 Solution

isoutamo
SplunkTrust
SplunkTrust

You could try this:
| rex field=_raw ".*:(?<message>[^:]+)"
r. Ismo

View solution in original post

isoutamo
SplunkTrust
SplunkTrust

You could try this:
| rex field=_raw ".*:(?<message>[^:]+)"
r. Ismo

Get Updates on the Splunk Community!

Get the T-shirt to Prove You Survived Splunk University Bootcamp

As if Splunk University, in Las Vegas, in-person, with three days of bootcamps and labs weren’t enough, now ...

Introducing the Splunk Community Dashboard Challenge!

Welcome to Splunk Community Dashboard Challenge! This is your chance to showcase your skills in creating ...

Wondering How to Build Resiliency in the Cloud?

IT leaders are choosing Splunk Cloud as an ideal cloud transformation platform to drive business resilience,  ...