Splunk Search

Regular Expression two words pattern

royimad
Builder

Hello Splunkers,

I have a log file as follow:
Time1 WARN a.b.c
Time2 ERROR 1.2.3
Time3 FATAL a.b.c
Time2 WARN a.b.c
Time4 WARN a.b.c

If i want to select all the fields after WARN , i can write a regular expression as:
(?i) WARN (?P[^ ]+)
This will select all the fields after WARN.

What do i need to change if i want to select with the same regular expression the fields after ERROR with the fields after WARN?

Thanks,

Tags (1)
0 Karma

kristian_kolb
Ultra Champion

a) Time1 WARN some message here
b) Time2 ERROR some other message
c) Time3 FATAL yet another message

Given the events above, the following will happen

regex                                       your_field
(?i)(?:WARN|ERROR|FATAL)(?<your_field>[^ ]+)            some, some, yet (respectively)
(?i)(?:WARN|ERROR|FATAL)(?<your_field>.+)               the remainder of the events (including spaces)
(?i)(?:WARN|ERROR)(?<your_field>[^ ]+)                  some, some, null(respectively)

/k

0 Karma
Get Updates on the Splunk Community!

New Year. New Skills. New Course Releases from Splunk Education

A new year often inspires reflection—and reinvention. Whether your goals include strengthening your security ...

Splunk and TLS: It doesn't have to be too hard

Overview Creating a TLS cert for Splunk usage is pretty much standard openssl.  To make life better, use an ...

Faster Insights with AI, Streamlined Cloud-Native Operations, and More New Lantern ...

Splunk Lantern is a Splunk customer success center that provides practical guidance from Splunk experts on key ...