Splunk Search

How to search a string

RGullur
New Member

Hi Community, please help me how to extract BOLD/underlines value from below string:

[2025-01-22 13:33:33,899] INFO Setting connector ABC_SOMECONNECTOR_CHANGE_EVENT_SRC_Q_V1 state to PAUSED (org.apache.kafka.connect.runtime.Worker:1391)

Labels (1)
0 Karma

yuanliu
SplunkTrust
SplunkTrust

Combining everyone's suggestions, here is a command that is ready to go if that string is all you need:

| rex "Setting connector (<myfield>\S+)"

How strictly or loosely you want to set anchors and matches heavily depends on actual data and use case.  This is just something to get you started.

0 Karma

isoutamo
SplunkTrust
SplunkTrust
regex101.com is excellent place to try how these rex are working or not. It also show execution cost of different versions and contains some other help.

bowesmana
SplunkTrust
SplunkTrust

As @dural_yyz says, the regex is easy - you can use this with the rex command

https://docs.splunk.com/Documentation/Splunk/9.4.0/SearchReference/rex

 

0 Karma

dural_yyz
Motivator

The regex is simple enough.

^.*\sSetting\sconnector\s(?<connector_event>[^\s]+).*$
0 Karma

PickleRick
SplunkTrust
SplunkTrust

Anchoring the regex to the beginning of the string is not needed and actually significantly impacts the performance (match in 154 steps vs. 29 without the "^.*" part).

Get Updates on the Splunk Community!

Application management with Targeted Application Install for Victoria Experience

  Experience a new era of flexibility in managing your Splunk Cloud Platform apps! With Targeted Application ...

Index This | What goes up and never comes down?

January 2026 Edition  Hayyy Splunk Education Enthusiasts and the Eternally Curious!   We’re back with this ...

Splunkers, Pack Your Bags: Why Cisco Live EMEA is Your Next Big Destination

The Power of Two: Splunk &#43; Cisco at "Ludicrous Scale"   You know Splunk. You know Cisco. But have you seen ...