Splunk Search

How to parse an event and get a table

sangs8788
Communicator

I have an error event in this format indexed in Splunk.

Error for batch element #1: One or more values in the INSERT statement, UPDATE statement, or foreign key update caused by a DELETE statement are not valid because the primary key, unique constraint or unique index identified by "2" constrains table "TABLE_NAME" from having duplicate values for the index key.. SQLCODE=-803, SQLSTATE=23505, DRIVER=4.11.77

How do I extract the TABLE_NAME out of this event?

Thanks

0 Karma
1 Solution

cpetterborg
SplunkTrust
SplunkTrust

In your Search command in SPL:

... | rex "constrains table \"(?P<tablename>[^\"]*)\""

View solution in original post

0 Karma

cpetterborg
SplunkTrust
SplunkTrust

In your Search command in SPL:

... | rex "constrains table \"(?P<tablename>[^\"]*)\""
0 Karma

sangs8788
Communicator

Thanks. it worked.

0 Karma
Get Updates on the Splunk Community!

.conf25 Community Recap

Hello Splunkers, And just like that, .conf25 is in the books! What an incredible few days — full of learning, ...

Splunk App Developers | .conf25 Recap & What’s Next

If you stopped by the Builder Bar at .conf25 this year, thank you! The retro tech beer garden vibes were ...

Congratulations to the 2025-2026 SplunkTrust!

Hello, Splunk Community! We are beyond thrilled to announce our newest group of SplunkTrust members!  The ...