Splunk Enterprise

need help on rex

Ash1
Communicator

From the below sample logs we need rex for 

1. "appl has successfully completed all authentication flows."

2. "Login complete"

 

2023-01-11 12:34:22,678 DITAU [taskstatus-8] {DIM: hgtijNMHy67v | DIS: aHJyikjI | DIC: HY56GFT6 | PI: 678.89.987 | ND: ks | APP: |OS: iOS-1-7.1 | REV" } APPDA - 87687654356789 - appl has successfully completed all authentication flows.
2023-01-11 12:34:22,678 DITAU [taskstatus-8] {DIM: hgtijNMHy67v | DIS: aHJyikjI | DIC: HY56GFT6 | PI: 678.89.987 | ND: ks | APP: |OS: iOS-1-7.1 | REV" } APPDA - 87687654356789 - appl has successfully completed all authentication flows.
2023-01-11 12:34:22,678 INFO [taskstatus-8] {DIM: hgtijNMHy67v | DIS: aHJyikjI | DIC: HY56GFT6 | PI: 678.89.987 | ND: ks | APP: | Req: POST /ai/v2/api/assert | OS: iOS-16.6 | VER: 23.4.0} AUDIT - Login complete
2023-01-11 12:34:22,678 INFO [taskstatus-8] {DIM: hgtijNMHy67v | DIS: aHJyikjI | DIC: HY56GFT6 | PI: 678.89.987 | ND: ks | APP: | Req: POST /ai/v2/api/assert | OS: iOS-16.6 | VER: 23.4.0} AUDIT - Login complete

 

Labels (1)
0 Karma

richgalloway
SplunkTrust
SplunkTrust

The rex command is for extracting fields using regular expressions.  What fields do you need to extract from those events?

If you just need to find events with either of those strings then you don't need rex at all.  Just put the strings in your base search.

 

index=foo ( "appl has successfully completed all authentication flows." OR "Login complete" )

 

---
If this reply helps you, Karma would be appreciated.
0 Karma

Ash1
Communicator

Hi @richgalloway , I need to do field extra action for those 2 strings which i mentioned.

That's why I asked for rex

Field 1: appl has successfully completed all authentication flows (field name as success_logins)

Field2: Login complete"  (field name as complete_logins)

 

0 Karma

ITWhisperer
SplunkTrust
SplunkTrust
| rex "(?<success_logins>appl has successfully completed all authentication flows.)"
| rex "(?<complete_logins>Login complete)"
0 Karma
Career Survey
First 500 qualified respondents will receive a $20 gift card! Tell us about your professional Splunk journey.

Can’t make it to .conf25? Join us online!

Get Updates on the Splunk Community!

Community Content Calendar, September edition

Welcome to another insightful post from our Community Content Calendar! We're thrilled to continue bringing ...

Splunkbase Unveils New App Listing Management Public Preview

Splunkbase Unveils New App Listing Management Public PreviewWe're thrilled to announce the public preview of ...

Leveraging Automated Threat Analysis Across the Splunk Ecosystem

Are you leveraging automation to its fullest potential in your threat detection strategy?Our upcoming Security ...