Splunk Search

Correct Syntax for rex for a user

LizAndy123
Explorer

I have a simple search 

index=xxxxx "User ID" and I need the correct syntax to get the actual username in the results.

Sample Event

INFO xcvxcvxcvxcvxcvxcvxcvxcvxcvxcvvcx - Logged User ID-XXXXXX

Now I can easy do a count of how many people logged on but need to report on the XXXXXX

I thought about doing

index=xxxxx 'User ID" | rex field=_raw "User\/s\ID\/-\(?<username>\d+)" | stats count by username

The search is returning the results and just a count but I need to see the username in my stats.

I am new to this so please mind the ignorance 

Labels (1)
0 Karma
1 Solution

richgalloway
SplunkTrust
SplunkTrust

The regular expression in the rex command has some misplaced escape characters that are preventing matches.  Try this query

index=xxxxx 'User ID" 
| rex field=_raw "User\sID-(?<username>\w+)" 
| stats count by username

 

---
If this reply helps you, Karma would be appreciated.

View solution in original post

0 Karma

richgalloway
SplunkTrust
SplunkTrust

The regular expression in the rex command has some misplaced escape characters that are preventing matches.  Try this query

index=xxxxx 'User ID" 
| rex field=_raw "User\sID-(?<username>\w+)" 
| stats count by username

 

---
If this reply helps you, Karma would be appreciated.
0 Karma
Get Updates on the Splunk Community!

Enter the Splunk Community Dashboard Challenge for Your Chance to Win!

The Splunk Community Dashboard Challenge is underway! This is your chance to showcase your skills in creating ...

.conf24 | Session Scheduler is Live!!

.conf24 is happening June 11 - 14 in Las Vegas, and we are thrilled to announce that the conference catalog ...

Introducing the Splunk Community Dashboard Challenge!

Welcome to Splunk Community Dashboard Challenge! This is your chance to showcase your skills in creating ...