Splunk Search

How to extract a field in my sample event log?

rileyken
Explorer

here is a small piece of an event in my log:

;GET.SVC.INFO 01-25-17 404<

it starts with a semi-colon and contains the text GET.SVC.INFO a space and then the data formatted as mm-dd-yy and then a space followed by the user id which in this case is 404 followed by an ampsersand lt and an ending semi-colon

I would like to extract the user id at index time as a field name myuserid

thanks

1 Solution

skoelpin
SplunkTrust
SplunkTrust

Assuming your userid is only word characters, this should work.

INFO\s\d+\-\d+\-\d+\s\d+\<(?<myuserid>\w+)

Assuming you need a CO and don't want to bump the service.. You should go to Extract New Fields on the left under Selected Fields, I'd prefer to write my own regular expression and enter in the regex above. Preview the extractions then save

View solution in original post

0 Karma

skoelpin
SplunkTrust
SplunkTrust

Assuming your userid is only word characters, this should work.

INFO\s\d+\-\d+\-\d+\s\d+\<(?<myuserid>\w+)

Assuming you need a CO and don't want to bump the service.. You should go to Extract New Fields on the left under Selected Fields, I'd prefer to write my own regular expression and enter in the regex above. Preview the extractions then save

0 Karma
Get Updates on the Splunk Community!

What's new in Splunk Cloud Platform 9.1.2312?

Hi Splunky people! We are excited to share the newest updates in Splunk Cloud Platform 9.1.2312! Analysts can ...

What’s New in Splunk Security Essentials 3.8.0?

Splunk Security Essentials (SSE) is an app that can amplify the power of your existing Splunk Cloud Platform, ...

Let’s Get You Certified – Vegas-Style at .conf24

Are you ready to level up your Splunk game? Then, let’s get you certified live at .conf24 – our annual user ...