Splunk Search

How to parse an event and get a table

sangs8788
Communicator

I have an error event in this format indexed in Splunk.

Error for batch element #1: One or more values in the INSERT statement, UPDATE statement, or foreign key update caused by a DELETE statement are not valid because the primary key, unique constraint or unique index identified by "2" constrains table "TABLE_NAME" from having duplicate values for the index key.. SQLCODE=-803, SQLSTATE=23505, DRIVER=4.11.77

How do I extract the TABLE_NAME out of this event?

Thanks

0 Karma
1 Solution

cpetterborg
SplunkTrust
SplunkTrust

In your Search command in SPL:

... | rex "constrains table \"(?P<tablename>[^\"]*)\""

View solution in original post

0 Karma

cpetterborg
SplunkTrust
SplunkTrust

In your Search command in SPL:

... | rex "constrains table \"(?P<tablename>[^\"]*)\""
0 Karma

sangs8788
Communicator

Thanks. it worked.

0 Karma
Get Updates on the Splunk Community!

Introducing the Splunk Community Dashboard Challenge!

Welcome to Splunk Community Dashboard Challenge! This is your chance to showcase your skills in creating ...

Built-in Service Level Objectives Management to Bridge the Gap Between Service & ...

Wednesday, May 29, 2024  |  11AM PST / 2PM ESTRegister now and join us to learn more about how you can ...

Get Your Exclusive Splunk Certified Cybersecurity Defense Engineer Certification at ...

We’re excited to announce a new Splunk certification exam being released at .conf24! If you’re headed to Vegas ...