Splunk Search

help regex

DiviR
Engager

I have this kind of logs

00:00:47: %LINK-3-UPDOWN: Interface GigabitEthernet0/1, changed state to down
00:00:48: %LINEPROTO-5-UPDOWN: Line protocol on Interface Vlan3, changed state to up
00:00:48: %LINEPROTO-5-UPDOWN: Line protocol on Interface GigabitEthernet0/5, changed state to down

How can I extract severity and interface?

TIA

Tags (2)
0 Karma
1 Solution

mayurr98
Super Champion

hey try this

index=your_index | rex field=_raw "%\w+-(?P<Severity>[^\-]+)-.*Interface\s(?P<Interface>[^\,]+)"

Also check this to see this in action
https://regex101.com/r/IYRjiZ/1

Let me know if this helps!

View solution in original post

mayurr98
Super Champion

hey try this

index=your_index | rex field=_raw "%\w+-(?P<Severity>[^\-]+)-.*Interface\s(?P<Interface>[^\,]+)"

Also check this to see this in action
https://regex101.com/r/IYRjiZ/1

Let me know if this helps!

DiviR
Engager

thanks it works but is there any way to extract description as well after interface?

0 Karma

mayurr98
Super Champion

try this then

    index=your_index | rex field=_raw "%\w+-(?P<Severity>[^\-]+)-.*Interface\s(?P<Interface>[^\,]+)\,(?P<Description>.*)"
Career Survey
First 500 qualified respondents will receive a $20 gift card! Tell us about your professional Splunk journey.
Get Updates on the Splunk Community!

Observe and Secure All Apps with Splunk

 Join Us for Our Next Tech Talk: Observe and Secure All Apps with SplunkAs organizations continue to innovate ...

What's New in Splunk Observability - August 2025

What's New We are excited to announce the latest enhancements to Splunk Observability Cloud as well as what is ...

Introduction to Splunk AI

How are you using AI in Splunk? Whether you see AI as a threat or opportunity, AI is here to stay. Lucky for ...