Splunk Search

Splunk rex field extraction issue

dineshCool
New Member

Hi Guys,

I have to extract one field from the below log and i tried this regex in https://rubular.com/ "(?<=^4Nett\s\W\W)(\W.*)$" This regex exactly working what i am looking for.

Status report: "<App name> :: <Status>"
ABC_Service :: Started in 2 sec

but when i try this in splunk it is not giving me the extracted field.

<base query>|rex (?<Application_status><=^4Nett\s\W\W)(\W.*)$

My expected result
Started in 2 sec

Please give me a hint what i am missing here

Tags (2)
0 Karma
1 Solution

renjith_nair
Legend

@dineshCool,

If you have the :: delimiter always in the events try

rex "::\s+(?<Application_Status>.*)"
---
What goes around comes around. If it helps, hit it with Karma 🙂

View solution in original post

0 Karma

renjith_nair
Legend

@dineshCool,

If you have the :: delimiter always in the events try

rex "::\s+(?<Application_Status>.*)"
---
What goes around comes around. If it helps, hit it with Karma 🙂
0 Karma
Get Updates on the Splunk Community!

Splunk Decoded: Service Maps vs Service Analyzer Tree View vs Flow Maps

It’s Monday morning, and your phone is buzzing with alert escalations – your customer-facing portal is running ...

What’s New in Splunk Observability – September 2025

What's NewWe are excited to announce the latest enhancements to Splunk Observability, designed to help ITOps ...

Fun with Regular Expression - multiples of nine

Fun with Regular Expression - multiples of nineThis challenge was first posted on Slack #regex channel ...