Splunk Search

Can you help me with a regex field extraction?

season88481
Contributor

Hi guys,

I got some the strange events as follows:

timestamp: xxxx
controlType: xxxx
criticality: false
object: xxxx
replace: xxxx

timestamp: xxxx
controlType: xxxx
criticality: false
controlType2: xxxx
criticality: true
object: xxxx
delete: xxxx

timestamp: xxxx
controlType: xxxx
criticality: false
object: xxxx
add: xxxx

They are multi-line events, and have different line number. The first line of each event starts with a timestamp. The last line of the event ends with an HTTP method, e.g. replace, add, delete.

I want to extract the HTTP method. But cannot get it working.

Here is rex I used:

mybaseSearch| rex field=_raw "^(replace|add|delete)(?<method>\:\s)"

Anyone got a better idea. Sorry not sure how to use keywords as the value of the field.

Many thanks.

Cheers,
Vincent

0 Karma

renjith_nair
Legend

@season88481 ,

Give this a try

|rex field=_raw max_match=0 "(replace|delete|add): (?<METHOD>\S+)"
---
What goes around comes around. If it helps, hit it with Karma 🙂
0 Karma
Get Updates on the Splunk Community!

Prove Your Splunk Prowess at .conf25—No Prereqs Required!

Your Next Big Security Credential: No Prerequisites Needed We know you’ve got the skills, and now, earning the ...

Splunk Observability Cloud's AI Assistant in Action Series: Observability as Code

This is the sixth post in the Splunk Observability Cloud’s AI Assistant in Action series that digs into how to ...

Splunk Answers Content Calendar, July Edition I

Hello Community! Welcome to another month of Community Content Calendar series! For the month of July, we will ...