Splunk Search

How to write a Rex query that will ignore some characters and then extract the message?

Splunk235
Engager

I have error logs like the below. How can I write a Rex query to match both the logs and only extract the message after the first colon (:)? Thanks.

 

Sample Log lines:

Script exception for job id 'ABc12345' : Too many rows: 500.

Script exception for job id 'XyZ78943' : Too many DMLs: 20.

 

Results should be:

Too many rows: 500.

Too many DMLs: 20.

Labels (3)
0 Karma
1 Solution

gcusello
SplunkTrust
SplunkTrust

Hi @Splunk235,

please try this regex:

| rex "Script exception for job id \'\w*\d*\' : (?<message>[^\.]*)"

that you can test at https://regex101.com/r/tJwzeA/1

Ciao.

Giuseppe

View solution in original post

0 Karma

Thulasinathan_M
Communicator

Hi,
Here is the try anywhere query for your requirement.

 

| makeresults 
| eval _raw="Script exception for job id 'ABc12345' : Too many rows: 500."
| rex field=_raw ": (?<Extracted>.*)"

 

 

0 Karma

gcusello
SplunkTrust
SplunkTrust

Hi @Splunk235,

please try this regex:

| rex "Script exception for job id \'\w*\d*\' : (?<message>[^\.]*)"

that you can test at https://regex101.com/r/tJwzeA/1

Ciao.

Giuseppe

0 Karma

Splunk235
Engager

Is there a way to embed the same into this query?

rex field=logLine "(Error Occurred During Script|UnhandledException ->)(\s|\S)(?<errorMessage>.*)"

 

This didn't work, but something like this?

rex field=logLine "(Error Occurred During Script|for job id \'\w*\d*\' :|UnhandledException ->)(\s|\S)(?<errorMessage>.*)"

0 Karma

gcusello
SplunkTrust
SplunkTrust

Hi @Splunk235 ,

good for you, see next time!

Ciao and happy splunking

Giuseppe

P.S.: Karma Points are appreciated by all the contributors 😉

0 Karma

gcusello
SplunkTrust
SplunkTrust

Hi @Splunk235 ,

yes, you can test your regex and it runs.

let us know if we can help you more, or, please, accept one answer for the other people of Community.

Ciao and happy splunking

Giuseppe

P.S.: Karma Points are appreciated by all the contributors 😉

0 Karma
Get Updates on the Splunk Community!

Combine Multiline Logs into a Single Event with SOCK - a Guide for Advanced Users

This article is the continuation of the “Combine multiline logs into a single event with SOCK - a step-by-step ...

Everything Community at .conf24!

You may have seen mention of the .conf Community Zone 'round these parts and found yourself wondering what ...

Index This | I’m short for "configuration file.” What am I?

May 2024 Edition Hayyy Splunk Education Enthusiasts and the Eternally Curious!  We’re back with a Special ...