Hello,
I have events that span multiple lines. One such event looks as follows:
...
# User details
ID: 123
Username: admin
Group: admin
Group: bin
...
Each event has at least one Group line.
I want to create a field extraction for the first occurence of Group.
So, for the example above the extracted field should have the value admin.
How do I create such a field extraction?
Try this
| rex Group:\s(?<group>\w+)\n+
Thank you for your answer!
When I test your regex then I see there are two match objects:
https://regex101.com/r/lQXqFx/1
How will Splunk behave in this case?
It's working off that \n+
added at the end, saying grab only the first match. If this answered your question, please accept it and close it out
try this in splunk with the rex command its working
It is working.
However, I cannot find any documentation as to Splunk handles multiple match objects.
by default its matching ungreedy, and if you want it to be global you can add flaggs.
I am not sure if there is any doc on that.