Splunk Search

How to parse an event and get a table

sangs8788
Communicator

I have an error event in this format indexed in Splunk.

Error for batch element #1: One or more values in the INSERT statement, UPDATE statement, or foreign key update caused by a DELETE statement are not valid because the primary key, unique constraint or unique index identified by "2" constrains table "TABLE_NAME" from having duplicate values for the index key.. SQLCODE=-803, SQLSTATE=23505, DRIVER=4.11.77

How do I extract the TABLE_NAME out of this event?

Thanks

0 Karma
1 Solution

cpetterborg
SplunkTrust
SplunkTrust

In your Search command in SPL:

... | rex "constrains table \"(?P<tablename>[^\"]*)\""

View solution in original post

0 Karma

cpetterborg
SplunkTrust
SplunkTrust

In your Search command in SPL:

... | rex "constrains table \"(?P<tablename>[^\"]*)\""
0 Karma

sangs8788
Communicator

Thanks. it worked.

0 Karma
Get Updates on the Splunk Community!

Deep Dive into Federated Analytics: Unlocking the Full Power of Your Security Data

In today’s complex digital landscape, security teams face increasing pressure to protect sprawling data across ...

Your summer travels continue with new course releases

Summer in the Northern hemisphere is in full swing, and is often a time to travel and explore. If your summer ...

From Alert to Resolution: How Splunk Observability Helps SREs Navigate Critical ...

It's 3:17 AM, and your phone buzzes with an urgent alert. Wire transfer processing times have spiked, and ...