Splunk Search

extract http response code

praveenvvn
Explorer

I have events consisting of a msg field with data like below:

dev.scurry.com - [2020-01-05T19:08:10.7658789Z] "PUT /case-pst/msging/eith/TNT/2020-01-05/blob/tenthouse.txt HTTP/1.1" 200 0 61814 "-" "-" "182.236.164.11:25412" "182.236.0.0:12001" x_forwarded_for:"182.236.164.11, 182.236.164.11" x_forwarded_proto:"https" vcap_request_id:"asdf098a0-j453-8asdf8-876-8907asdf9087" response_time:0.079841 gorouter_time:0.000152 app_id:"asdf098a0-j453-8asdf8-876-8907asdf9087" app_index:"0" x_cf_routererror:"-" x_b3_traceid:"asdf098as78987" x_b3_spanid:"7a7sad9898d90khjk" x_b3_parentspanid:"-" q3:"7asdf987987asdf9-78968asfdklj"

I need to extract the http status code and only for PUT requests.

Am new to regex. Any advise or pointers.

Thanks.

Labels (1)
0 Karma
1 Solution

richgalloway
SplunkTrust
SplunkTrust

This should do it.

| rex field=msg "\\\"PUT [^\\\"]+\\\" (?<errorCode>\d+)"
---
If this reply helps you, Karma would be appreciated.

View solution in original post

richgalloway
SplunkTrust
SplunkTrust

This should do it.

| rex field=msg "\\\"PUT [^\\\"]+\\\" (?<errorCode>\d+)"
---
If this reply helps you, Karma would be appreciated.
Get Updates on the Splunk Community!

AI for AppInspect

We’re excited to announce two new updates to AppInspect designed to save you time and make the app approval ...

App Platform's 2025 Year in Review: A Year of Innovation, Growth, and Community

As we step into 2026, it’s the perfect moment to reflect on what an extraordinary year 2025 was for the Splunk ...

Operationalizing Entity Risk Score with Enterprise Security 8.3+

Overview Enterprise Security 8.3 introduces a powerful new feature called “Entity Risk Scoring” (ERS) for ...