Splunk Search

How to add a column to a stats table using rex

harshparikhxlrd
Path Finder

I'm fairly new to splunk and have just learned how to use the rex/regex. I am trying to add a column in my string search to a statistics table to display the name of the workstation. This is my current string.

0 Karma
1 Solution

gcusello
Esteemed Legend

Hi harshparikhxlrd
if the field you want i ComputerName, probably you already have because Splunk recognize by itself the pair field=value.
Anyway the regex to extract Computername is:

| rex "(?ms)ComputerName\=(?<Computername>[^ ]*)Task"

that you can test at https://regex101.com/r/0n0rks/1

So your search will be (sorry I cannot rewrite your regex because I cannot see it, use Code Sample button to share regexes):

index=monitoring sourcetype=PEGA:WinEventLog:Application ( SourceName="RoboticLogging" OR SourceName="Application" ) ("Department=" "HRSS_STL") ("Type=" "Error") 
| rex "Message : (?.+.?)" 
| rex "(?ms)ComputerName\=(?<Computername>[^ ]*)Task"
| stats count by ex 
| rename ex as Exception 

Ciao.
Giuseppe

View solution in original post

gcusello
Esteemed Legend

Hi harshparikhxlrd
if the field you want i ComputerName, probably you already have because Splunk recognize by itself the pair field=value.
Anyway the regex to extract Computername is:

| rex "(?ms)ComputerName\=(?<Computername>[^ ]*)Task"

that you can test at https://regex101.com/r/0n0rks/1

So your search will be (sorry I cannot rewrite your regex because I cannot see it, use Code Sample button to share regexes):

index=monitoring sourcetype=PEGA:WinEventLog:Application ( SourceName="RoboticLogging" OR SourceName="Application" ) ("Department=" "HRSS_STL") ("Type=" "Error") 
| rex "Message : (?.+.?)" 
| rex "(?ms)ComputerName\=(?<Computername>[^ ]*)Task"
| stats count by ex 
| rename ex as Exception 

Ciao.
Giuseppe

gcusello
Esteemed Legend

Hi harshparikhxlrd,
Try now:

index=monitoring sourcetype=PEGA:WinEventLog:Application ( SourceName="RoboticLogging" OR SourceName="Application" ) ("Department=" "HRSS_STL") ("Type=" "Error") 
| rex "(?ms)ComputerName\=(?<Computername>[^ ]*)Task.*Message\=(?<Message>.*)"
| stats stats values(Message) As Message values(Computername) AS Computername count by ex 
| rename ex as Exception 

That you can test at https://regex101.com/r/0n0rks/2 .

Ciao.
Giuseppe

0 Karma

harshparikhxlrd
Path Finder

Adding to previous post:

Message=

0 Karma
Get Updates on the Splunk Community!

New Splunk Observability innovations: Deeper visibility and smarter alerting to ...

You asked, we delivered. Splunk Observability Cloud has several new innovations giving you deeper visibility ...

Synthetic Monitoring: Not your Grandma’s Polyester! Tech Talk: DevOps Edition

Register today and join TekStream on Tuesday, February 28 at 11am PT/2pm ET for a demonstration of Splunk ...

Instrumenting Java Websocket Messaging

Instrumenting Java Websocket MessagingThis article is a code-based discussion of passing OpenTelemetry trace ...