Splunk Search

Yet More field extraction problems

integritysuppor
Engager

My application logs to win event application log. I have the following log and am trying to extract the SAG: values:
Message=Component: Sag:SN-I
Event Number: 206 Event Class: Security
Description: foobar
SWIFTNet User : frodo
Certificate : HSM1:seo-sag1
DN : cn=seo-sag1,o=irceie2d,o=swift

So in the above I would be trying to get SN-I

I use the field extractor and it tells me that everything is extracting correctly but when the field is generated in the search it extracts everything from SN-I to the end of the log as a field.

The regex the field extraction uses is: (?i) Sag:(?P.+)

I've tried to use $ and \z \Z at the end of the regex to signify the end but it still extracts everything from SN-I to the end of the log.

Any ideas what's going on here as I managed to extract the Event Number without any issue.

Tags (3)
0 Karma
1 Solution

starcher
Influencer

Try: (?i) Sag:(?P.[^ ]+)

View solution in original post

0 Karma

starcher
Influencer

Try: (?i) Sag:(?P.[^ ]+)

0 Karma

integritysuppor
Engager

yeah that pretty much did it, was outputting as "SN-I Event" though.

So final regex that I used:

(?i) Sag:(?P.[^ ]+)Event

0 Karma
Get Updates on the Splunk Community!

Splunk MCP & Agentic AI: Machine Data Without Limits

  Discover how the Splunk Model Context Protocol (MCP) Server can revolutionize the way your organization ...

Finding Based Detections General Availability

Overview  We’ve come a long way, folks, but here in Enterprise Security 8.4 I’m happy to announce Finding ...

Get Your Hands Dirty (and Your Shoes Comfy): The Splunk Experience

Hands-On Learning and Technical Seminars  Sometimes, you just need to see the code. For those looking for a ...