Splunk Search

How to extract one value from log in a query

mbojorq3
New Member

I am trying to extract the name of log output but struggling with how to. I have this query

<query>index=dap ("user login Time") </query>

That I have a log that outputs

log: [2m2021-11-19-t18:27:42.996z [22m [34m auth [39m [32minfo user login time, Justin [ ...

stream: stdout

time:  2021-11-19-t18:2742.99648142z

 

I want to output only the time and username:

Time:                                         user:

2021-11-19-t18:27:42.     Time, Justin

Labels (2)
Tags (1)
0 Karma

ITWhisperer
SplunkTrust
SplunkTrust

Assuming time has already been extracted (_time) on indexing, you could try this to get the user

| rex "user login\s+(?<user>[^\[]+)\s\["
0 Karma
Get Updates on the Splunk Community!

Splunk Decoded: Service Maps vs Service Analyzer Tree View vs Flow Maps

It’s Monday morning, and your phone is buzzing with alert escalations – your customer-facing portal is running ...

What’s New in Splunk Observability – September 2025

What's NewWe are excited to announce the latest enhancements to Splunk Observability, designed to help ITOps ...

Fun with Regular Expression - multiples of nine

Fun with Regular Expression - multiples of nineThis challenge was first posted on Slack #regex channel ...