Splunk Search

How to extract one value from log in a query

mbojorq3
New Member

I am trying to extract the name of log output but struggling with how to. I have this query

<query>index=dap ("user login Time") </query>

That I have a log that outputs

log: [2m2021-11-19-t18:27:42.996z [22m [34m auth [39m [32minfo user login time, Justin [ ...

stream: stdout

time:  2021-11-19-t18:2742.99648142z

 

I want to output only the time and username:

Time:                                         user:

2021-11-19-t18:27:42.     Time, Justin

Labels (2)
Tags (1)
0 Karma

ITWhisperer
SplunkTrust
SplunkTrust

Assuming time has already been extracted (_time) on indexing, you could try this to get the user

| rex "user login\s+(?<user>[^\[]+)\s\["
0 Karma
Get Updates on the Splunk Community!

Machine Learning - Assisted Adaptive Thresholding

Let’s talk thresholding. Have you set up static thresholds? Tired of static thresholds triggering false ...

Observability Unlocked: Kubernetes Monitoring with Splunk Observability Cloud

  Ready to master Kubernetes and cloud monitoring like the pros?Join Splunk’s Growth Engineering team for an ...

Wrapping Up Cybersecurity Awareness Month

October might be wrapping up, but for Splunk Education, cybersecurity awareness never goes out of season. ...