Splunk Search

How to extract fields with empty values at index time?

pavan_bhumanapa
New Member

In our logs, we have the below two lines where we need to extract both empty & values for Dms_Code. Currently we are getting only values, but not empty, due to this other values are not getting populated in the UI.

Regex :

EXTRACT-Server_Name=\[(?<TimeDate>[^]]+)\]\s\[(?P<Server_Name>[^]]+)\]\s\[(?P<severity>[^]]+)\]\s\[\w+\-(?P<Dms_Code>[^]]+)\]\s\[(?P<Incident>[^]]+)\]\s


[2014-07-16T22:38:17.251+08:00] [apj_corp1_osb_dit_admin] [NOTIFICATION] [] [oracle.security.audit.logger]

[2014-07-16T22:37:47.379+08:00] [apj_corp1_osb_dit_admin] [WARNING] [DMS-50966] [oracle.dms.collector]
Tags (2)
0 Karma

somesoni2
SplunkTrust
SplunkTrust

Try this

EXTRACT-Server_Name = \[(?<TimeDate>[^\]]+)\]\s\[(?P<Server_Name>[^\]]+)\]\s\[(?P<severity>[^\]]+)\]\s\[(\w+-)*(?P<Dms_Code>\d*)]\s\[(?<Incident>[^\]]+)\]

strive
Influencer

I think it is because in your regex you have used w+ for Dms_Code, it is not getting empty values. Modify your regex to accept empty values also.

0 Karma
Get Updates on the Splunk Community!

Routing logs with Splunk OTel Collector for Kubernetes

The Splunk Distribution of the OpenTelemetry (OTel) Collector is a product that provides a way to ingest ...

Welcome to the Splunk Community!

(view in My Videos) We're so glad you're here! The Splunk Community is place to connect, learn, give back, and ...

Tech Talk | Elevating Digital Service Excellence: The Synergy of Splunk RUM & APM

Elevating Digital Service Excellence: The Synergy of Real User Monitoring and Application Performance ...