Splunk Search

REX command for the logline

nivethainspire_
Explorer

I need to write a rex command for the below log, Please help me out.

log:
xxx,xxx, D_Name="sag01 "TCC - QA - ORAA cvo0011 (CLCDTQ)"" , xxx

In the above log , i need to write a rex command to extract 3 type of values in single field as below
D_Name
sag01
cvo0011
CLCDTQ

Tags (1)
0 Karma

hunters_splunk
Splunk Employee
Splunk Employee

Hi nivethainspire_07,

Based on the sample log line you provided, please try the following query:

 ... | rex field=_raw "="(?<field1>.*)\s".*\s(?<field2>.*)\s\((?<field3>.*)\)"""

If it does not work for your other log lines, please provide more log data so that others can gain a more complete understanding of your log format.

Hope it helps. Thanks!
Hunter

0 Karma

jkat54
SplunkTrust
SplunkTrust

If the log always contains D_Name="value" then splunk will auto-extract this field at search time when using verbose mode.

0 Karma

martin_mueller
SplunkTrust
SplunkTrust

Smart > Verbose 😛

martin_mueller
SplunkTrust
SplunkTrust

You'll need to know more about the format of that line, find out what rules govern what value is where.

I could write a regular expression that works for this one example, but it's unlikely to work for all your data without that format knowledge.

0 Karma
Career Survey
First 500 qualified respondents will receive a $20 gift card! Tell us about your professional Splunk journey.

Can’t make it to .conf25? Join us online!

Get Updates on the Splunk Community!

Community Content Calendar, September edition

Welcome to another insightful post from our Community Content Calendar! We're thrilled to continue bringing ...

Splunkbase Unveils New App Listing Management Public Preview

Splunkbase Unveils New App Listing Management Public PreviewWe're thrilled to announce the public preview of ...

Leveraging Automated Threat Analysis Across the Splunk Ecosystem

Are you leveraging automation to its fullest potential in your threat detection strategy?Our upcoming Security ...