Splunk Search

Need help in extraction

srinivas_gowda
Path Finder

Hello all,

 

I am tryin to extract only the highlighted from the below event, however I am failing to extract.

Can you please let me know here.

"Error","","/Example/JP1/NTEVENT_LOGTRAP/Oracle.persona","LOGFILE","NTEVENTLOG","LOGFILE","NTEVENTLOG","","","","","",9,"A0","1630500097","A1","PSD067","A2","Application","A3","Error","A4","None","A5","20","A6","N/A"

"Error","","/Example/JP1/NTEVENT_LOGTRAP/Microsoft-Windows-Kerberos-Key-Distribution-Center","LOGFILE","NTEVENTLOG","LOGFILE","NTEVENTLOG"

Thank you

Labels (4)
0 Karma
1 Solution

ITWhisperer
SplunkTrust
SplunkTrust
| rex "\/Example(?<resource>[^\"]+)"

View solution in original post

ITWhisperer
SplunkTrust
SplunkTrust
| rex "\/Example(?<resource>[^\"]+)"

ashvinpandey
Contributor

@srinivas_gowda Use the below command in your search query

 

 

| regex field=_raw "Example(?<resource>.*?)\""

 

 

Also, If this reply helps you, an upvote would be appreciated.

 

0 Karma
Get Updates on the Splunk Community!

AI for AppInspect

We’re excited to announce two new updates to AppInspect designed to save you time and make the app approval ...

App Platform's 2025 Year in Review: A Year of Innovation, Growth, and Community

As we step into 2026, it’s the perfect moment to reflect on what an extraordinary year 2025 was for the Splunk ...

Operationalizing Entity Risk Score with Enterprise Security 8.3+

Overview Enterprise Security 8.3 introduces a powerful new feature called “Entity Risk Scoring” (ERS) for ...