Splunk Search

Regular expression to extract http status

thenormalone
Path Finder

I have http statuses that come in from 2 different indexes, with almost the same event but the event from one indexer has a combination of space and comma as a delimiter and other just has spaces. 

How do I split the event from the search string such that I get the status from both indexes. I have 

| rex field=_raw "^(?:[^\s]*\s){8}(?P<statusCode>\d+)"  

 

but this only check for space, I need to also include comma as a delimiter too

Labels (4)
0 Karma
1 Solution

ITWhisperer
SplunkTrust
SplunkTrust
| rex field=_raw "^(?:[^\"]*\"){2}\s(?P<statusCode>\d+)"  

View solution in original post

ITWhisperer
SplunkTrust
SplunkTrust

Do you have examples of the two types of logs that you can share?

0 Karma

thenormalone
Path Finder

example from indexer 1: 

172.22.83.162 - - [10/Jul/2018:14:46:42 +0000] "GET /tests/benefits HTTP/1.1" 200 337 "-" "Ruby" 0

 

example from indexer 2: 

172.22.83.162 - - [10/Jul/2018:14:46:42,+0000] "GET /tests/benefits HTTP/1.1" 200 337 "-" "Ruby" 0

 

The timestamp has a comma instead of a space

0 Karma

ITWhisperer
SplunkTrust
SplunkTrust
| rex field=_raw "^(?:[^\"]*\"){2}\s(?P<statusCode>\d+)"  
Get Updates on the Splunk Community!

Webinar Recap | Revolutionizing IT Operations: The Transformative Power of AI and ML ...

The Transformative Power of AI and ML in Enhancing Observability   In the realm of IT operations, the ...

.conf24 | Registration Open!

Hello, hello! I come bearing good news: Registration for .conf24 is now open!   conf is Splunk’s rad annual ...

ICYMI - Check out the latest releases of Splunk Edge Processor

Splunk is pleased to announce the latest enhancements to Splunk Edge Processor.  HEC Receiver authorization ...