Splunk Enterprise

extract a field and display results in a table

mrr6892
Loves-to-Learn

i am trying to extract specific words starts with gi. from all events and display in a table below is my string but it returned nothing please advise.

String:

mysearch | rex field=_raw "Start(?<"gi">.*)End"

Event:

/p.rabbitmq/rabbitmq/queues/81061abe-4007-46c4-b9f2-4855cda5ace2/gi.nam.quotesvc.submission.cleared.evt.flq/consumers

Labels (1)
0 Karma

richgalloway
SplunkTrust
SplunkTrust

I take it you're trying to match the bold text.  If so, the current rex command won't work and should be throwing an error because of the unescaped quotation marks in the expression.  Try this:

| rex "(?<gi>gi.*)"
---
If this reply helps you, Karma would be appreciated.
0 Karma

mrr6892
Loves-to-Learn

i tried but still its not displaying the all value starts with gi. in table by the way below is the exact event i think what ever bold test i am looking is assigned to name: field like below


   name/p.rabbitmq/rabbitmq/queues/fc99de5c-2a5f-41e2-ba86-2cb662b8e771/gi.nam.submission.intake.cmd.flq/depth

0 Karma
Get Updates on the Splunk Community!

Introducing Value Insights (Beta): Understand the Business Impact your organization ...

Real progress on your strategic priorities starts with knowing the business outcomes your teams are delivering ...

Enterprise Security (ES) Essentials 8.3 is Now GA — Smarter Detections, Faster ...

As of today, Enterprise Security (ES) Essentials 8.3 is now generally available, helping SOC teams simplify ...

Unlock Instant Security Insights from Amazon S3 with Splunk Cloud — Try Federated ...

Availability: Must be on Splunk Cloud Platform version 10.1.2507.x to view the free trial banner. If you are ...