Splunk Search

How to trim information from search output?

jugarugabi
Path Finder

Hi, 

I am having the following query: 

index=* sourcetype=CustomAccessLog | table "host", "source"

 

The output is:

host source
server32.de.db.com /path/to/server/instances/IFM_RT_1/logs/subdir_logs/log.file
server31.de.db.com /path/to/server/instances/IFM_RT_2/logs/subdir_logs/log.file

 

I would need to alter the search query so that the output is becoming:

host source
32 IFM_RT_1
31 IFM_RT_2

 

Tried using the following for the IFM_RT_

index=* sourcetype=CustomAccessLog | rex field=_raw "(?<IFM_RT_>.*)", but I couldn't get the needed data. 

Can I have your help here?

 

Thanks!

Labels (1)
0 Karma
1 Solution

gcusello
SplunkTrust
SplunkTrust

Hi @jugarugabi,

you could try to use the following regexes:

index=* sourcetype=CustomAccessLog 
| rex field=source "(?<source>IFM_RT_\d*)"
| rex field=host "^server(?<host>\d+)"
| table host source

Ciao.

Giuseppe

View solution in original post

0 Karma

gcusello
SplunkTrust
SplunkTrust

Hi @jugarugabi,

you could try to use the following regexes:

index=* sourcetype=CustomAccessLog 
| rex field=source "(?<source>IFM_RT_\d*)"
| rex field=host "^server(?<host>\d+)"
| table host source

Ciao.

Giuseppe

0 Karma

gcusello
SplunkTrust
SplunkTrust

Hi @jugarugabi,

good for you, see next time!

Ciao and happy splunking

Giuseppe

P.S.: Karma Points are appreciated 😉

0 Karma
Get Updates on the Splunk Community!

Uncovering Multi-Account Fraud with Splunk Banking Analytics

Last month, I met with a Senior Fraud Analyst at a nationally recognized bank to discuss their recent success ...

Secure Your Future: A Deep Dive into the Compliance and Security Enhancements for the ...

What has been announced?  In the blog, “Preparing your Splunk Environment for OpensSSL3,”we announced the ...

New This Month in Splunk Observability Cloud - Synthetic Monitoring updates, UI ...

This month, we’re delivering several platform, infrastructure, application and digital experience monitoring ...