Splunk Search

How do I create the regex to extract this field from my sample data?

Splunk_rocks
Path Finder

I have a events like below in my servers so I want write a search to extract tps(cur) value in a table format with _time it is occurred. I have tried regex as well as the Field Extractor, but nothing has worked. Any help is greatly appreciated.

Nov 28, 2015 3:57:59 AM com.xxrklogic.developer.XXX.Monitor monitorResults
INFO: completed all tasks 1428872/1428872, 548 tps(avg), 612 tps(cur), ETC 00:00:00, 0 active threads.
0 Karma

diogofgm
SplunkTrust
SplunkTrust

try this:

<your search>| rex field=_raw "\s+(?<tpscur>\d+)\s+tps\(cur\)" | table _time tpscur

off course if you intend to use this often just do a field extraction so you dont have to use the rex command in que search

------------
Hope I was able to help you. If so, some karma would be appreciated.
0 Karma

jplumsdaine22
Influencer

Have you tried testing your regular expression with a tool like https://www.debuggex.com/ ? If you post the full search string that has failed for you (including the regex command) we can help you with your regex

0 Karma
Career Survey
First 500 qualified respondents will receive a $20 gift card! Tell us about your professional Splunk journey.
Get Updates on the Splunk Community!

Tech Talk Recap | Mastering Threat Hunting

Mastering Threat HuntingDive into the world of threat hunting, exploring the key differences between ...

Observability for AI Applications: Troubleshooting Latency

If you’re working with proprietary company data, you’re probably going to have a locally hosted LLM or many ...

Splunk AI Assistant for SPL vs. ChatGPT: Which One is Better?

In the age of AI, every tool promises to make our lives easier. From summarizing content to writing code, ...