Splunk Search

Extract string and place in new field

sogeniusio
Path Finder

Trying to extract a string into a new field. A sample of log is as follows:

productName = Special Day Argyle Socks for Men (Special Day Argyle Socks Size 10-13)

| rex "productName\s=\s(?<ProductName>\s[\w\W]+)"

Not sure where to go from here. When I test within regex101, it works just fine. But when I move to Splunk i get nothing.

Update

Added this but now it doesn't stop at a new line

| rex "productName\s=\s(?<ProductName>[\w\W]+\n)"
0 Karma
1 Solution

sogeniusio
Path Finder

Figured it out

| rex "productName\s=\s(?<ProductName>.*)"

View solution in original post

0 Karma

sogeniusio
Path Finder

Figured it out

| rex "productName\s=\s(?<ProductName>.*)"
0 Karma

cpetterborg
SplunkTrust
SplunkTrust

I've changed your comment to an answer. Please accept your answer so that it can be noted as having been answered to your satisfaction. You should earn a badge for doing so as a result. 🙂

0 Karma

sogeniusio
Path Finder

Cheers, Thanks!

0 Karma
Got questions? Get answers!

Join the Splunk Community Slack to learn, troubleshoot, and make connections with fellow Splunk practitioners in real time!

Meet up IRL or virtually!

Join Splunk User Groups to connect and learn in-person by region or remotely by topic or industry.

Get Updates on the Splunk Community!

Why Splunk Customers Should Attend Cisco Live 2026 Las Vegas

Why Splunk Customers Should Attend Cisco Live 2026 Las Vegas     Cisco Live 2026 is almost here, and this ...

What Is the Name of the USB Key Inserted by Bob Smith? (BOTS Hint, Not the Answer)

Hello Splunkers,   So you searched, “what is the name of the usb key inserted by bob smith?”  Not gonna lie… ...

Automating Threat Operations and Threat Hunting with Recorded Future

    Automating Threat Operations and Threat Hunting with Recorded Future June 29, 2026 | Register   Is your ...