Splunk Search

How to use rex command to extract this field from my sample log?

Abilan1
Path Finder

Hi ,

COSE#1017 Associated kernel not found. Please see Enterprise Server log for details: SocID:19041 PID:13695 BSFN:CustomShipConfirmWrapper user:AIAINBND

I want to create that highlighted term as a new event field. It may vary in length in following events. Could anyone help me?

Thanks

0 Karma
1 Solution

MuS
Legend

Hi Abilan1,

try something like this, which is based on your provided example:

your base search here | rex "\sBSFN:(?<myField>[^\s]*)" | table myField

cheers, MuS

View solution in original post

Richfez
SplunkTrust
SplunkTrust

If BSFN is a constant, which it appears to be, something as simple as

 ... | rex "BSFN:(?<GiveMeAName>\w+)"

That says

BSFN: Match the string "BSFN:" (including the colon)

(? Then extract a field named "GiveMeAName"

\w+ Which consists of one or more "word" type characters (letters)

) And finally close off this extraction.

Abilan1
Path Finder

Thank You rich!!! it worked

0 Karma

MuS
Legend

Hi Abilan1,

try something like this, which is based on your provided example:

your base search here | rex "\sBSFN:(?<myField>[^\s]*)" | table myField

cheers, MuS

Abilan1
Path Finder

Thank You MuS!!

0 Karma
Get Updates on the Splunk Community!

Splunk App for Anomaly Detection End of Life Announcement

Q: What is happening to the Splunk App for Anomaly Detection?A: Splunk is officially announcing the ...

Aligning Observability Costs with Business Value: Practical Strategies

 Join us for an engaging Tech Talk on Aligning Observability Costs with Business Value: Practical ...

Mastering Data Pipelines: Unlocking Value with Splunk

 In today's AI-driven world, organizations must balance the challenges of managing the explosion of data with ...