Splunk Search

How to write a Rex query that will ignore some characters and then extract the message?

Splunk235
Engager

I have error logs like the below. How can I write a Rex query to match both the logs and only extract the message after the first colon (:)? Thanks.

 

Sample Log lines:

Script exception for job id 'ABc12345' : Too many rows: 500.

Script exception for job id 'XyZ78943' : Too many DMLs: 20.

 

Results should be:

Too many rows: 500.

Too many DMLs: 20.

Labels (3)
0 Karma
1 Solution

gcusello
SplunkTrust
SplunkTrust

Hi @Splunk235,

please try this regex:

| rex "Script exception for job id \'\w*\d*\' : (?<message>[^\.]*)"

that you can test at https://regex101.com/r/tJwzeA/1

Ciao.

Giuseppe

View solution in original post

0 Karma

Thulasinathan_M
Contributor

Hi,
Here is the try anywhere query for your requirement.

 

| makeresults 
| eval _raw="Script exception for job id 'ABc12345' : Too many rows: 500."
| rex field=_raw ": (?<Extracted>.*)"

 

 

0 Karma

gcusello
SplunkTrust
SplunkTrust

Hi @Splunk235,

please try this regex:

| rex "Script exception for job id \'\w*\d*\' : (?<message>[^\.]*)"

that you can test at https://regex101.com/r/tJwzeA/1

Ciao.

Giuseppe

0 Karma

Splunk235
Engager

Is there a way to embed the same into this query?

rex field=logLine "(Error Occurred During Script|UnhandledException ->)(\s|\S)(?<errorMessage>.*)"

 

This didn't work, but something like this?

rex field=logLine "(Error Occurred During Script|for job id \'\w*\d*\' :|UnhandledException ->)(\s|\S)(?<errorMessage>.*)"

0 Karma

gcusello
SplunkTrust
SplunkTrust

Hi @Splunk235 ,

good for you, see next time!

Ciao and happy splunking

Giuseppe

P.S.: Karma Points are appreciated by all the contributors 😉

0 Karma

gcusello
SplunkTrust
SplunkTrust

Hi @Splunk235 ,

yes, you can test your regex and it runs.

let us know if we can help you more, or, please, accept one answer for the other people of Community.

Ciao and happy splunking

Giuseppe

P.S.: Karma Points are appreciated by all the contributors 😉

0 Karma
Get Updates on the Splunk Community!

Transforming Financial Data into Fraud Intelligence

Every day, banks and financial companies handle millions of transactions, logins, and customer interactions ...

How to send events & findings from AWS to Splunk using Amazon EventBridge

Amazon EventBridge is a serverless service that uses events to connect application components together, making ...

Exciting News: The AppDynamics Community Joins Splunk!

Hello Splunkers,   I’d like to introduce myself—I’m Ryan, the former AppDynamics Community Manager, and I’m ...