Splunk Search

field extraction for error message

Hema_Nithya
Explorer

I want to extract the  following information make it as a field as "error message" .

index=os source="/var/log/syslog" "*authentication failure*" OR "Generic preauthentication failure"

Events example :

Nov 28 01:02:31 server1 sssd[ldap_child[12010]]: Failed to initialize credentials using keytab [MEMORY:/etc/krb5.keytab]: Generic preauthentication failure. Unable to create GSSAPI-encrypted LDAP connection.

Nov 28 01:02:29 server2  proxy_child[1939385]: pam_unix(system-auth-ac:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=10.177.46.57 user=hippm

Labels (1)
0 Karma

bowesmana
SplunkTrust
SplunkTrust

What defines the start and end of the error text in each of those examples and how much of that do you want to get in error_message

You could very simply do this

| rex "\]:\s(?<error_message>.*)"

which would take everything after the ]: to the end of the event

0 Karma
Get Updates on the Splunk Community!

Operationalizing TDIR: Building a More Resilient, Scalable SOC

Optimizing SOC workflows with a unified, risk-based approach to Threat Detection, Investigation, and Response ...

Almost Too Eventful Assurance: Part 1

Modern IT and Network teams still struggle with too many alerts and isolating issues before they are notified. ...

Demo Day: Strengthen Your SOC with Splunk Enterprise Security 8.1

Today’s threat landscape is more complex than ever. Security operation centers (SOCs) are overwhelmed with ...