Splunk Search

Why am I receiving specific error message from the raw output?

Sudharsanan27
Loves-to-Learn Lots

I am using the below cluster search 

| cluster t=0.1 showcount=t countfield=no_of_events | table _time,no_of_events _raw | sort -no_of_events | dedup no_of_events

in the output iam getting the entire raw message as in the table. however, i want to show only the error message.

Is there any way to extract only specific messages instead of full raw message

 

Labels (1)
0 Karma

yuanliu
SplunkTrust
SplunkTrust

That very much depends on the difference between raw message and the error message you are looking for.  The whole point of Splunk in my view is the freedom to extract any token into data field.  But you have to show what raw message contains and which part you consider an error message. (Anonymize as needed.)

0 Karma
Career Survey
First 500 qualified respondents will receive a $20 gift card! Tell us about your professional Splunk journey.

Can’t make it to .conf25? Join us online!

Get Updates on the Splunk Community!

Calling All Security Pros: Ready to Race Through Boston?

Hey Splunkers, .conf25 is heading to Boston and we’re kicking things off with something bold, competitive, and ...

Beyond Detection: How Splunk and Cisco Integrated Security Platforms Transform ...

Financial services organizations face an impossible equation: maintain 99.9% uptime for mission-critical ...

Customer success is front and center at .conf25

Hi Splunkers, If you are not able to be at .conf25 in person, you can still learn about all the latest news ...