Splunk Search

Help with regular expressions

javierlf
Explorer

I have a syslog where I want to extract only these 3 events:

1)
Engine Busy Utilization CPU Busy I/O Busy Idle


Engine 0                        1.1 %      0.1 %     98.8 %              
Engine 1                       71.3 %      2.0 %     26.7 %              
Engine 2                        0.0 %      0.0 %     99.9 %              
Engine 3                        0.4 %      0.7 %     98.9 %              
Engine 4                        3.6 %      0.9 %     95.5 %              
Engine 5                        0.2 %      0.7 %     99.1 %              
Engine 6                        0.4 %      0.5 %     99.1 %              
Engine 7                        1.1 %      0.1 %     98.9 %              
Engine 8                        0.9 %      0.3 %     98.8 %              
Engine 9                        0.1 %      0.0 %     99.9 %              
Engine 10                       0.0 %      0.0 %    100.0 %              
Engine 11                       0.0 %      0.1 %     99.9 %              
Engine 12                       0.1 %      0.1 %     99.8 %              
Engine 13                       0.1 %      0.4 %     99.5 %              
Engine 14                      39.7 %      4.1 %     56.2 %              
Engine 15                       0.2 %      0.0 %     99.8 %              
Engine 16                       0.0 %      0.0 %    100.0 %              
Engine 17                       0.8 %      0.0 %     99.2 %              
Engine 18                       0.0 %      0.0 %    100.0 %              
Engine 19                       0.0 %      0.0 %    100.0 %              
Engine 20                       0.1 %      0.0 %     99.9 %              
Engine 21                       3.9 %      1.7 %     94.4 %              
Engine 22                       2.2 %      0.9 %     96.9 %              
Engine 23                       0.7 %      0.0 %     99.3 %              
Engine 24                       0.8 %      0.9 %     98.3 %              
Engine 25                       0.1 %      0.0 %     99.8 %              
Engine 26                       0.0 %      0.0 %    100.0 %              
Engine 27                      39.7 %      5.2 %     55.2 %              
Engine 28                       4.3 %      0.4 %     95.3 %              
Engine 29                       1.1 %      0.1 %     98.9 %              

Summary Total 172.8 % 19.2 % 2807.9 %

Average 5.8 % 0.6 % 93.6 %


2)
Cache: default data cache
per sec per xact count % of total
------------------------- ------------ ------------ ---------- ----------
Spinlock Contention n/a n/a n/a 0.2 %


3)
Cache Search Summary
Total Cache Hits 523491.0 708.5 157047286 99.9 %

All extra lines that do not belong to these events, I dont want the indexing splunk.

I understand that I must change the LINEA_BREAKER IN props.conf
I do not know how to build the regular expression. Someone could be so kind to help me assemble the expression?

thank you very much, greetings!
Javier.

Tags (1)
0 Karma

justinfranks
Path Finder

Hi Javier,

You question need clarifying. What data are you trying to keep?

0 Karma

javierlf
Explorer

hello, thank you,
I need to extract from a log only 5% of the information. I do not know well how to do this

0 Karma
Get Updates on the Splunk Community!

Why You Can't Miss .conf25: Unleashing the Power of Agentic AI with Splunk & Cisco

The Defining Technology Movement of Our Lifetime The advent of agentic AI is arguably the defining technology ...

Deep Dive into Federated Analytics: Unlocking the Full Power of Your Security Data

In today’s complex digital landscape, security teams face increasing pressure to protect sprawling data across ...

Your summer travels continue with new course releases

Summer in the Northern hemisphere is in full swing, and is often a time to travel and explore. If your summer ...