Splunk Dev

rex invalid argument

stwong
Communicator

Hi,

We're using 6.5.3. Got error "Error in 'rex' command: Invalid argument: ' ' " for query like following:


index=security source="/data/*/vpn" IP=192.168.206.176 OR outerIP=192.168.206.176
            | rex field=_raw "IP=(?<VPN_IP>[^\s]*).*DN:.*outerIP=(?<clientIP>[^\s]*)"

I tried to replace with a simpler expression like "^(?<EveryThing>.*)$" but also get the same error.

Would anyone please help? Sorry for the newbie question.

Thanks and regards

Tags (1)
0 Karma
1 Solution

DalJeanis
Legend

Interesting. It is not you, it is something quite strange. The rex works just fine for me on some mocked up data. It is possible that there is some invisible/nonprintable control character in your search causing the problem. First, copy the entire search to notepad, verify that it is plain text, then ctrl-a ctrl-v to paste it back into splunk and submit the search again. If you get the same error, then proceed with these triage steps...

Okay, here's some triage steps. First, do this and check to see that there is a _raw field in the output...

 index=security source="/data/*/vpn" IP=192.168.206.176 OR outerIP=192.168.206.176 | head 1

Next, add just this line after the above. Copy and paste it from here...

| rex "IP=(?<VPN_IP>[^\s]*)"

If that causes an error, then please post the exact wording of the error, and a non-confidential version of the _raw. If there is no error, then add this line and run again...

| rex "outerIP=(?<clientIP>[^\s]*)

If there is no error yet, then let us know and we can try to determine what was wrong with the rex. If the error does crop up, then when it appears, we will have more information.

View solution in original post

0 Karma

DalJeanis
Legend

Interesting. It is not you, it is something quite strange. The rex works just fine for me on some mocked up data. It is possible that there is some invisible/nonprintable control character in your search causing the problem. First, copy the entire search to notepad, verify that it is plain text, then ctrl-a ctrl-v to paste it back into splunk and submit the search again. If you get the same error, then proceed with these triage steps...

Okay, here's some triage steps. First, do this and check to see that there is a _raw field in the output...

 index=security source="/data/*/vpn" IP=192.168.206.176 OR outerIP=192.168.206.176 | head 1

Next, add just this line after the above. Copy and paste it from here...

| rex "IP=(?<VPN_IP>[^\s]*)"

If that causes an error, then please post the exact wording of the error, and a non-confidential version of the _raw. If there is no error, then add this line and run again...

| rex "outerIP=(?<clientIP>[^\s]*)

If there is no error yet, then let us know and we can try to determine what was wrong with the rex. If the error does crop up, then when it appears, we will have more information.

0 Karma

stwong
Communicator

Hello,

Thanks a lot.

Right, probably some invisible characters embedded as I copied the query from an app installed.
It works if I typed it from scratch.

Thanks again.
Best Regards

Get Updates on the Splunk Community!

Updated Team Landing Page in Splunk Observability

We’re making some changes to the team landing page in Splunk Observability, based on your feedback. The ...

New! Splunk Observability Search Enhancements for Splunk APM Services/Traces and ...

Regardless of where you are in Splunk Observability, you can search for relevant APM targets including service ...

Webinar Recap | Revolutionizing IT Operations: The Transformative Power of AI and ML ...

The Transformative Power of AI and ML in Enhancing Observability   In the realm of IT operations, the ...