Splunk Search

How to extract two fields with the same field name from a multiline event?

stevepraz
Path Finder

Trying to get some data from our alerting/event system into Splunk. There is a report with key value pairs that already existed so I attempted to use that. I am running into an issue with the Journal field, which can occur multiple times if the event has been updated frequently. I have an extraction that works for the first one, but no way to get any additional ones if they occur.

Here is a sample of the data:

SevReq=0
Ticket=NoTicket
Type=1
DataCenter=dc1
    State=Closed
Journal=2015/04/09 21:39:15 Alert acknowledged by user1. 
Journal=2015/04/09 22:47:30 Alert Closed by user2. 

END
Here is my extraction that works for the first line:

Journal=(?P.*)

1 Solution

stephane_cyrill
Builder

Hi, If you are using rex command, try this:

.......| rex max_match=0 field=.....

View solution in original post

jeffland
SplunkTrust
SplunkTrust

You can set max_match = 0 to retrieve more than one match of your capture group: rex reference

gwilliams1_2
Engager

how do you get this to work with field extractions though?

jeffland
SplunkTrust
SplunkTrust

Ah, stephane_cyrille was faster 🙂

0 Karma

stephane_cyrill
Builder

You can just vote when your agree. I like your speed jeffland......

jeffland
SplunkTrust
SplunkTrust

I know... You simply posted while I was writing my answer (which took some time as I got a little sidetracked trying stuff on regex101.com) 🙂

0 Karma

stephane_cyrill
Builder

Hi, If you are using rex command, try this:

.......| rex max_match=0 field=.....
Get Updates on the Splunk Community!

Splunk Enterprise Security 8.x: The Essential Upgrade for Threat Detection, ...

 Prepare to elevate your security operations with the powerful upgrade to Splunk Enterprise Security 8.x! This ...

Get Early Access to AI Playbook Authoring: Apply for the Alpha Private Preview ...

Passionate about security automation? Apply now to our AI Playbook Authoring Alpha private preview ...

Reduce and Transform Your Firewall Data with Splunk Data Management

Managing high-volume firewall data has always been a challenge. Noisy events and verbose traffic logs often ...