Splunk Search

Struggling with rex

splunkingsid
Engager

Hoping to find a solution here for my rex query (new to rex)

 

I have an event that looks like this

 

time="2024-06-22T00:31:43.939620127Z" level=info msg="uuid="KENT-12345678-1234-1234-1234-123456789123", tkt=INC123456789, ci=SAP, state=Escalate, opened=2024-06-22 00:31:06, closed=0001-01-01 00:00:00 +0000 UTC, title=server123.corp: userTrap: 1 ABC Job: 927370523:ABC_0001_DEF_XX_GHIJK_XXXX2_MOSU:Killed"

 

How do I write a query that will extract this string "server123.corp: userTrap: 1 ABC Job: 927370523:ABC_0001_DEF_XX_GHIJK_XXXX2_MOSU:Killed"

 

Thank you very much

Labels (1)
0 Karma
1 Solution

yuanliu
SplunkTrust
SplunkTrust

Without other samples, I'd go with the most aggressive:

| rex "title=(?<title>[^\"]+)"

View solution in original post

yuanliu
SplunkTrust
SplunkTrust

Without other samples, I'd go with the most aggressive:

| rex "title=(?<title>[^\"]+)"
Get Updates on the Splunk Community!

.conf25 Community Recap

Hello Splunkers, And just like that, .conf25 is in the books! What an incredible few days — full of learning, ...

Splunk App Developers | .conf25 Recap & What’s Next

If you stopped by the Builder Bar at .conf25 this year, thank you! The retro tech beer garden vibes were ...

Congratulations to the 2025-2026 SplunkTrust!

Hello, Splunk Community! We are beyond thrilled to announce our newest group of SplunkTrust members!  The ...