Splunk Search

split string with square brackets into individual fields

plcd63
Explorer

Hello,

I'm new to Splunk and I'm looking for some advice.

My search, e.g.

 

 

<mysearch> | table attributes

 

 

returns a value in the following format:

name[test 1]srcintf[int1]dstintf[int2]srcaddr[address1]dstaddr[dest1 dest2]service[svc1 svc2 svc3]comments[test comment here]

I would like to split the output into individual fields. The values are within square brackets, i.e.

nametest 1
srcintfint1
dstintfint2
... 

 

Many thanks!

Labels (2)
0 Karma
1 Solution

ITWhisperer
SplunkTrust
SplunkTrust
| rex "name\[(?<name>[^\]]*)]srcintf\[(?<srcintf>[^\]]*)]dstintf\[(?<dstintf>[^\]]*)]srcaddr\[(?<srcaddr>[^\]]*)]dstaddr\[(?<dstaddr>[^\]]*)]service\[(?<service>[^\]]*)]comments\[(?<comments>[^\]]*)]"

View solution in original post

ITWhisperer
SplunkTrust
SplunkTrust
| rex "name\[(?<name>[^\]]+)]srcintf\[(?<srcintf>[^\]]+)]dstintf\[(?<dstintf>[^\]]+)]srcaddr\[(?<srcaddr>[^\]]+)]dstaddr\[(?<dstaddr>[^\]]+)]service\[(?<service>[^\]]+)]comments\[(?<comments>[^\]]+)]"

plcd63
Explorer

Thank you! This works, unless one of the fields is empty, e.g. comments[], which is very likely to happen on some of them, depending on the user input provided.

0 Karma

ITWhisperer
SplunkTrust
SplunkTrust
| rex "name\[(?<name>[^\]]*)]srcintf\[(?<srcintf>[^\]]*)]dstintf\[(?<dstintf>[^\]]*)]srcaddr\[(?<srcaddr>[^\]]*)]dstaddr\[(?<dstaddr>[^\]]*)]service\[(?<service>[^\]]*)]comments\[(?<comments>[^\]]*)]"

plcd63
Explorer

To take this step further, could I also use rex if not every time all of the values are part of the reported field?

e.g. my 1st search might return:

name[test 1]srcaddr[address1]

my second search:

nsrcintf[int1]dstintf[int2]srcaddr[address1]comments[test comment here]

my third search:

comments[test comment here]

etc...

0 Karma

ITWhisperer
SplunkTrust
SplunkTrust

Yes, and sometimes you need to do this if your events don't have all the anchor strings - if this is the case, none of the fields are extracted if you use a single rex string i.e. there has to be a complete match for anything to be extracted. This is useful in some instances and not so much in others, but tbh, it is better this way around in the majority of cases.

Got questions? Get answers!

Join the Splunk Community Slack to learn, troubleshoot, and make connections with fellow Splunk practitioners in real time!

Meet up IRL or virtually!

Join Splunk User Groups to connect and learn in-person by region or remotely by topic or industry.

Get Updates on the Splunk Community!

Index This | What travels the world but is also stuck in place?

April 2026 Edition  Hayyy Splunk Education Enthusiasts and the Eternally Curious!   We’re back with this ...

Discover New Use Cases: Unlock Greater Value from Your Existing Splunk Data

Realizing the full potential of your Splunk investment requires more than just understanding current usage; it ...

Continue Your Journey: Join Session 2 of the Data Management and Federation Bootcamp ...

As data volumes continue to grow and environments become more distributed, managing and optimizing data ...