Splunk Search

Regular expression to extract http status

thenormalone
Path Finder

I have http statuses that come in from 2 different indexes, with almost the same event but the event from one indexer has a combination of space and comma as a delimiter and other just has spaces. 

How do I split the event from the search string such that I get the status from both indexes. I have 

| rex field=_raw "^(?:[^\s]*\s){8}(?P<statusCode>\d+)"  

 

but this only check for space, I need to also include comma as a delimiter too

Labels (4)
0 Karma
1 Solution

ITWhisperer
SplunkTrust
SplunkTrust
| rex field=_raw "^(?:[^\"]*\"){2}\s(?P<statusCode>\d+)"  

View solution in original post

ITWhisperer
SplunkTrust
SplunkTrust

Do you have examples of the two types of logs that you can share?

0 Karma

thenormalone
Path Finder

example from indexer 1: 

172.22.83.162 - - [10/Jul/2018:14:46:42 +0000] "GET /tests/benefits HTTP/1.1" 200 337 "-" "Ruby" 0

 

example from indexer 2: 

172.22.83.162 - - [10/Jul/2018:14:46:42,+0000] "GET /tests/benefits HTTP/1.1" 200 337 "-" "Ruby" 0

 

The timestamp has a comma instead of a space

0 Karma

ITWhisperer
SplunkTrust
SplunkTrust
| rex field=_raw "^(?:[^\"]*\"){2}\s(?P<statusCode>\d+)"  
Get Updates on the Splunk Community!

Infographic provides the TL;DR for the 2024 Splunk Career Impact Report

We’ve been buzzing with excitement about the recent validation of Splunk Education! The 2024 Splunk Career ...

Enterprise Security Content Update (ESCU) | New Releases

In December, the Splunk Threat Research Team had 1 release of new security content via the Enterprise Security ...

Why am I not seeing the finding in Splunk Enterprise Security Analyst Queue?

(This is the first of a series of 2 blogs). Splunk Enterprise Security is a fantastic tool that offers robust ...