Splunk Search

Help with regex to extract field "failure" and add to field called "error"

denisevw
Path Finder

Can anyone help me with a regular expression for an extraction please?

Need to extract "failure" from below and add to field called "Error":

160.2:ERR Code = <1/failure/7353280025534419>

This regex does not work:

rex field=_raw "\d+\:ERR\s+Code\s+\=\s\<1\/(?P<Error>[^\>]+)\/[0-9]\>"

Thanks in advance.

Tags (2)

alacercogitatus
SplunkTrust
SplunkTrust

REGEX! YAY!

<your_search> | rex field=_raw "\d+\:ERR\s+Code\s+=\s+<1/(?<Error>[^/]+)/"
0 Karma

somesoni2
Revered Legend

Try this

your base search | rex "\<\d+\/(?<Error>\w+)\/"
0 Karma

alacercogitatus
SplunkTrust
SplunkTrust

heh, I should reload page before answering 😄

linu1988
Champion

Hello,
Am not sure which part exactly would you like to extract.

if it's failure: |rex field=_raw "\/(?<Error>\S+)\/"

if it's the long digit which is the error code then: |rex field=_raw "\/(?<Error>\d+)\>"

Thanks,
L

0 Karma

linu1988
Champion

do you get any error? and is this all you have in the _raw data? try with more match...

|rex field=_raw "\\d+\/(?<Error>\S+)\/"
0 Karma

denisevw
Path Finder

The above regex did not work in my search.

0 Karma

denisevw
Path Finder

Thanks for the reply. I want to extract only the word "failure"

0 Karma
Get Updates on the Splunk Community!

The Splunk Success Framework: Your Guide to Successful Splunk Implementations

Splunk Lantern is a customer success center that provides advice from Splunk experts on valuable data ...

Splunk Training for All: Meet Aspiring Cybersecurity Analyst, Marc Alicea

Splunk Education believes in the value of training and certification in today’s rapidly-changing data-driven ...

Investigate Security and Threat Detection with VirusTotal and Splunk Integration

As security threats and their complexities surge, security analysts deal with increased challenges and ...