Splunk Search

Correct Syntax for rex for a user

LizAndy123
Path Finder

I have a simple search 

index=xxxxx "User ID" and I need the correct syntax to get the actual username in the results.

Sample Event

INFO xcvxcvxcvxcvxcvxcvxcvxcvxcvxcvvcx - Logged User ID-XXXXXX

Now I can easy do a count of how many people logged on but need to report on the XXXXXX

I thought about doing

index=xxxxx 'User ID" | rex field=_raw "User\/s\ID\/-\(?<username>\d+)" | stats count by username

The search is returning the results and just a count but I need to see the username in my stats.

I am new to this so please mind the ignorance 

Labels (1)
0 Karma
1 Solution

richgalloway
SplunkTrust
SplunkTrust

The regular expression in the rex command has some misplaced escape characters that are preventing matches.  Try this query

index=xxxxx 'User ID" 
| rex field=_raw "User\sID-(?<username>\w+)" 
| stats count by username

 

---
If this reply helps you, Karma would be appreciated.

View solution in original post

0 Karma

richgalloway
SplunkTrust
SplunkTrust

The regular expression in the rex command has some misplaced escape characters that are preventing matches.  Try this query

index=xxxxx 'User ID" 
| rex field=_raw "User\sID-(?<username>\w+)" 
| stats count by username

 

---
If this reply helps you, Karma would be appreciated.
0 Karma
Get Updates on the Splunk Community!

SplunkTrust Application Period is Officially OPEN!

It's that time, folks! The application/nomination period for the 2025 SplunkTrust is officially open! If you ...

Splunk Answers Content Calendar, June Edition II

Get ready to dive into Splunk Dashboard panels this week! We'll be tackling common questions around ...

Splunk Observability Cloud's AI Assistant in Action Series: Auditing Compliance and ...

This is the third post in the Splunk Observability Cloud’s AI Assistant in Action series that digs into how to ...