Splunk Search

Query Rex

StepneyGeezer
Explorer

Hello

 

Am a newbie and am looking to extract data from a sample set that looks like this (its ingested in JSON):

{
   levelinfo
   loguid="302650",  a_msg="HandlingStatus=Finished, Message=Changed
   log_typecontainerlogs
   streamstdout

}

 

I want to extract the uid data as well as the Message which is inside the a_msg.

I have 

rex field=log "uid=\"(?<uid>\d{1,}+)"

which gives me the uid, but I am REALLY struggling with the Message, ideally I would like a table to be produced so from the above data it would look like

UID, Message

-------------------

302650, PlanChanged

 

I am reading up on Rex and Reg Ex etc, but this particular request requires a quick turnaround and i am really struggling.  Any help would be appreciated.

 

Many thanks

Labels (2)
Tags (2)
0 Karma
1 Solution

ITWhisperer
SplunkTrust
SplunkTrust

No wonder you are struggling - this doesn't look like correctly formatted JSON - the rex you said works, doesn't work with the string you just post since it includes backslashes which are not in the rex you shared. If the backslashes really exist in your data, try something like this (the first part before the blank lines just sets up the data you shared.

| makeresults
| eval _raw="{\"log\":\"a_level=\\\"INFO\\\", a_uid=\\\"302650\\\", a_msg=\\\"HandlingStatus=Finished, Message=PlanChanged, MessageId=0c0277da-4b4a-4c4d-abcd-49b8c1e3f896, Result=True\\\", \"level\":\"info\"}"




| rex "uid=\\\\\"(?<uid>\d+).+Message=(?<message>[^,]+)"

View solution in original post

ITWhisperer
SplunkTrust
SplunkTrust

Please can you share the raw event in a code block </> rather than a formatted version of the event?

0 Karma

StepneyGeezer
Explorer
{"log":"a_level=\"INFO\", a_uid=\"302650\", a_msg=\"HandlingStatus=Finished, Message=PlanChanged, MessageId=0c0277da-4b4a-4c4d-abcd-49b8c1e3f896, Result=True\", "level":"info"}

Thanks @ITWhisperer  - you getting me excited, i have spent ages on this 

 

0 Karma

ITWhisperer
SplunkTrust
SplunkTrust

No wonder you are struggling - this doesn't look like correctly formatted JSON - the rex you said works, doesn't work with the string you just post since it includes backslashes which are not in the rex you shared. If the backslashes really exist in your data, try something like this (the first part before the blank lines just sets up the data you shared.

| makeresults
| eval _raw="{\"log\":\"a_level=\\\"INFO\\\", a_uid=\\\"302650\\\", a_msg=\\\"HandlingStatus=Finished, Message=PlanChanged, MessageId=0c0277da-4b4a-4c4d-abcd-49b8c1e3f896, Result=True\\\", \"level\":\"info\"}"




| rex "uid=\\\\\"(?<uid>\d+).+Message=(?<message>[^,]+)"

StepneyGeezer
Explorer

@ITWhisperer awesome thank you, this has saved me so much time.  it is producing what i need now albeit there are some anomalies in the data but i know what to do from here...thank you so much

0 Karma
Get Updates on the Splunk Community!

Introducing Splunk Enterprise 9.2

WATCH HERE! Watch this Tech Talk to learn about the latest features and enhancements shipped in the new Splunk ...

Adoption of RUM and APM at Splunk

    Unleash the power of Splunk Observability   Watch Now In this can't miss Tech Talk! The Splunk Growth ...

Routing logs with Splunk OTel Collector for Kubernetes

The Splunk Distribution of the OpenTelemetry (OTel) Collector is a product that provides a way to ingest ...