Splunk Search

How to extract a keyword from a log and create a chart based on the count of this field?

raindrop2
New Member

I am trying to extract the DENY keyword from the log, and then create a chart based on this field count.

"2014-06-15 21:29:51" Junior id=test3@test.com,ou=user,o=test,ou=services,dc=test,dc=rock,dc=org 726c434d6024d0a706 "Not Available" INFO o=test,ou=services,dc=test,dc=rock,dc=org "cn=dsameuser,ou=DSAME Users,dc=openam,dc=forgerock,dc=org" DENY ourusers.access "Not Available" 10.0.0.1

0 Karma

kristian_kolb
Ultra Champion

Since we still don't know how the other events look like, it'll be hard to give very precise advice. However, if the keyword you're after is either "PERMIT", "DENY" or "NA" (without the quotes), and these strings do not appear otherwise in your events, you could try;

props.conf
[your sourcetype]
EXTRACT-blah = \s(?(PERMIT|DENY|NA))\s

or if the position of the keyword is fixed, you can try to anchor your regex towards the end of the line;

props.conf
[your sourcetype]
EXTRACT-bleh = (?\S+)\s+\S+\s+\"[^\"]+\"\s+[\d.]+$

These are just some of the options available. With more information and sample events, you'll be able to get better help.

/K

0 Karma

raindrop2
New Member

thanks much for your response, I don't have permission to modify props.conf. so i have to figure out to get string to extract this keyword. The logs are the same format the only variable the status either (Permit Deny NA)

0 Karma

raindrop2
New Member

" I have "Permit" "Deny" "NA" variables, so i want on the chart to show me " how many permit,denay or na. thanks for your help ...

0 Karma

kristian_kolb
Ultra Champion

It depends on how you want to chart it, and what other events look like. Your original request can be satisfied with something like;

sourcetype=your_sourcetype " DENY " | timechart span=1h count

I.e. not extracting the field at all, but just searching for events that have the matching string, and then use a timechart to show them over.. time.

/k

0 Karma
Get Updates on the Splunk Community!

See just what you’ve been missing | Observability tracks at Splunk University

Looking to sharpen your observability skills so you can better understand how to collect and analyze data from ...

Weezer at .conf25? Say it ain’t so!

Hello Splunkers, The countdown to .conf25 is on-and we've just turned up the volume! We're thrilled to ...

How SC4S Makes Suricata Logs Ingestion Simple

Network security monitoring has become increasingly critical for organizations of all sizes. Splunk has ...