Splunk Search

help regex

DiviR
Engager

I have this kind of logs

00:00:47: %LINK-3-UPDOWN: Interface GigabitEthernet0/1, changed state to down
00:00:48: %LINEPROTO-5-UPDOWN: Line protocol on Interface Vlan3, changed state to up
00:00:48: %LINEPROTO-5-UPDOWN: Line protocol on Interface GigabitEthernet0/5, changed state to down

How can I extract severity and interface?

TIA

Tags (2)
0 Karma
1 Solution

mayurr98
Super Champion

hey try this

index=your_index | rex field=_raw "%\w+-(?P<Severity>[^\-]+)-.*Interface\s(?P<Interface>[^\,]+)"

Also check this to see this in action
https://regex101.com/r/IYRjiZ/1

Let me know if this helps!

View solution in original post

mayurr98
Super Champion

hey try this

index=your_index | rex field=_raw "%\w+-(?P<Severity>[^\-]+)-.*Interface\s(?P<Interface>[^\,]+)"

Also check this to see this in action
https://regex101.com/r/IYRjiZ/1

Let me know if this helps!

DiviR
Engager

thanks it works but is there any way to extract description as well after interface?

0 Karma

mayurr98
Super Champion

try this then

    index=your_index | rex field=_raw "%\w+-(?P<Severity>[^\-]+)-.*Interface\s(?P<Interface>[^\,]+)\,(?P<Description>.*)"
Get Updates on the Splunk Community!

Splunk MCP & Agentic AI: Machine Data Without Limits

  Discover how the Splunk Model Context Protocol (MCP) Server can revolutionize the way your organization ...

Finding Based Detections General Availability

Overview  We’ve come a long way, folks, but here in Enterprise Security 8.4 I’m happy to announce Finding ...

Get Your Hands Dirty (and Your Shoes Comfy): The Splunk Experience

Hands-On Learning and Technical Seminars  Sometimes, you just need to see the code. For those looking for a ...