Splunk Search

extract string to a field

navd
New Member

I have some strings appearing in the events , i want to extract them ,it doesnt have any keyvalue pair
sample event :-
6/15/18
4:53:00.123 PM 420420 1529074380797 2018-06-15 14:53:00.797 10.224.34 - - - - prod abc.services ffffffffdcfb607e-186-16403ef6ffd000 ERROR ERROR - - - - com.data.driver.core.exceptions.NouserAvailableException: All user(s) tried for query failed

so from the above event I would want to extract "com.data.driver.core.exceptions.NouserAvailableException"

Tags (1)
0 Karma

vinod94
Contributor

if the events are of the same type, you can try this...

| makeresults 
| eval data="6/15/18
4:53:00.123 PM 420420 1529074380797 2018-06-15 14:53:00.797 10.224.34 - - - - prod abc.services ffffffffdcfb607e-186-16403ef6ffd000 ERROR ERROR - - - - com.data.driver.core.exceptions.NouserAvailableException: All user(s) tried for query failed" 
| rename data as _raw 
| rex field=_raw "ERROR\s\-\s\-\s\-\s\-(?P<field_name>[^\:]+)"

lloydknight
Builder

Hello @navd

You may refer to this link to access the field extractor,
Or you can extract fields using regex. See link.

Also, if the provided sample event is in uniform with the succeeding events, try this query:

your base search | rex "\ERROR ERROR - - - - (?<Exception>.*)\:"

Hope it helps!

0 Karma

Ayn
Legend

What other data around it can you rely on to stay the same? Are the dashes before your text static for instance? Did you try the interactive field extractor?

0 Karma
Get Updates on the Splunk Community!

[Puzzles] Solve, Learn, Repeat: Dynamic formatting from XML events

This challenge was first posted on Slack #puzzles channelFor a previous puzzle, I needed a set of fixed-length ...

Enter the Agentic Era with Splunk AI Assistant for SPL 1.4

  &#x1f680; Your data just got a serious AI upgrade — are you ready? Say hello to the Agentic Era with the ...

Stronger Security with Federated Search for S3, GCP SQL & Australian Threat ...

Splunk Lantern is a Splunk customer success center that provides advice from Splunk experts on valuable data ...