Splunk Search

How to extract text from the Message field up to the first "." in Windows event logs?

daniel_knights
New Member

We have made a dashboard to show the rare events generated by users

Account_Name=XX* |rare limit=20 EventCode |table count, EventCode, Message

but with the message field, it outputs everything below the Message= field

How can I extract from the message field up to the first "." or carriage return?

What we are after is Message="An account was logged off."

0 Karma

jwahlgren
Engager

Try:

| eval Message=split(Message,".") | eval Short_Message=mvindex(Message,0) |table Short_Message

Edit: Depending on the message you can filter out what lines to show with (Message,0) were 0 is first line. So if you only wan't to show line 3 you can specify eval Short_Message=mvindex(Message,2). In your case the above query should be correct as you only want to show the first line in the message.

0 Karma

sundareshr
Legend

Try this. New field msg should have everything before the first "."

.... | rex field=Message "\"(?<msg>[^\.\n]+)"
0 Karma
Get Updates on the Splunk Community!

[Puzzles] Solve, Learn, Repeat: Dynamic formatting from XML events

This challenge was first posted on Slack #puzzles channelFor a previous puzzle, I needed a set of fixed-length ...

Enter the Agentic Era with Splunk AI Assistant for SPL 1.4

  &#x1f680; Your data just got a serious AI upgrade — are you ready? Say hello to the Agentic Era with the ...

Stronger Security with Federated Search for S3, GCP SQL & Australian Threat ...

Splunk Lantern is a Splunk customer success center that provides advice from Splunk experts on valuable data ...