- Mark as New
- Bookmark Message
- Subscribe to Message
- Mute Message
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
I am getting the log file imported to Splunk, but each line is an event with no field name. Can I break up the line into columns? If not, how do I parse the line to extract a number?
Index is:
index=test_7d sourcetype=kafka:producer:bigfix
Events are:
2023-06-22 09:15:44,270 root - INFO - 114510 events have been uploaded to topic DC2_Endpoint_Configuration_IBM_BigFix_Patch_Join on Kafka
2023-06-22 09:15:37,204 root - INFO - Executing getDatafromDB
2023-06-22 09:15:35,704 root - INFO - 35205 events have been uploaded to topic DC2_Endpoint_Configuration_IBM_BigFix_Patch_Join on Kafka
2023-06-22 09:15:33,286 root - INFO - Executing getDatafromDB
2023-06-22 09:15:32,703 root - INFO - 167996 events have been uploaded to topic DC2_Endpoint_Configuration_IBM_BigFix_Patch_Join on Kafka
2023-06-22 09:15:22,479 root - INFO - Executing getDatafromDB
2023-06-22 09:15:19,031 root - INFO - 181 events have been uploaded to topic DC2_Endpoint_Configuration_IBM_BigFix_Patch_Join on Kafka
Each line/event starts with the date, the wordwrap is making it look incorrect. I need to parse the bold number of each line after '- INFO -' and add a zero if no number. I can do this with a eval, but how do I parse if there is no field name to add to the 'regex' command?
For example, here I'm using 'regex' to remove Operating Systems from dataset on a fieldname 'operating_system' which is one column of an sourcetype:
| regex operating_system!="(Linux|AIX|CENTOS|WINDOWS|Digital UNIX|FreeBSD|HP-UX|Hyper-V|Juniper|Mac|Windows|NetBSD|OpenBSD|OpenVMS|Server 2012|Server Core 2012|Server 2016|Server 2019|Ubuntu|Solaris|Unix|ESX|vCenter Server|rbash|[\*\*\*\*\*\*]|\A[\-\-\-\-\-\-\-\-\-\-]|[\=\=\=\=\=\=\=\=\=\=])"
I found the erex command that works,
| erex ImportCount examples="0,35205,114510"
But you have to enter a sample of the text you are looking for. So it only works for one day and it has to be changed, the sample are values in the dataset, but everyday the log file changes with new values updated. Can regex be used in place of the examples?
- Mark as New
- Bookmark Message
- Subscribe to Message
- Mute Message
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content


There are many ways to parse data in Splunk, both at index time and at search time. Search time is the easiest so I'll focus on that.
The regex command does not parse data, it merely filters events. To extract fields from events, use the rex command. erex is training wheels for regular expressions - once you have a regex that works, put it in rex.
| rex "INFO - (?<eventCount>\d+)"
| fillnull value=0 eventCount
If this reply helps you, Karma would be appreciated.
- Mark as New
- Bookmark Message
- Subscribe to Message
- Mute Message
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content


There are many ways to parse data in Splunk, both at index time and at search time. Search time is the easiest so I'll focus on that.
The regex command does not parse data, it merely filters events. To extract fields from events, use the rex command. erex is training wheels for regular expressions - once you have a regex that works, put it in rex.
| rex "INFO - (?<eventCount>\d+)"
| fillnull value=0 eventCount
If this reply helps you, Karma would be appreciated.
