Splunk Search

Extract an information from a field

mikedavem
New Member

Hi all,

I'm working on an extraction of information into a SQL Server log.
I've a field Message that looks like :

LogName=Security
SourceName=MSSQLSERVER$AUDIT
EventType=0
...
statement:Login failed for user 'toto'. Reason : Password did not match that for the login provided. [CLIENT: clientname]
...

I would like to extract the part into the bracket [CLIENT: XXXX]
How can I do that ?
Sorry I'm a new user of splunk.

Regards

David

Tags (1)
0 Karma
1 Solution

rechteklebe
Path Finder

Hi,

there are two ways:

  1. Use the "Extract Fields" function in the dropdown on the left side (blue arrow).
    In the values type the name of your client, and you should get the pattern.
    In your search you can use the pattern with the rex command --> rex "PATTERN"

  2. Try with --> rex "(?i)provided.\s[(?P[^]]+)"

View solution in original post

0 Karma

mikedavem
New Member

Thanks rechteklebe, it's work.

I also learn how to generate a pattern with our instruction 🙂

Regards

0 Karma

rechteklebe
Path Finder

Hi,

there are two ways:

  1. Use the "Extract Fields" function in the dropdown on the left side (blue arrow).
    In the values type the name of your client, and you should get the pattern.
    In your search you can use the pattern with the rex command --> rex "PATTERN"

  2. Try with --> rex "(?i)provided.\s[(?P[^]]+)"

0 Karma

rechteklebe
Path Finder

Sorry I was wrong:
this should be the correct rex command:

rex "(?i)CLIENT:(?P[^]]+)"

0 Karma
Get Updates on the Splunk Community!

Splunk Custom Visualizations App End of Life

The Splunk Custom Visualizations apps End of Life for SimpleXML will reach end of support on Dec 21, 2024, ...

Introducing Splunk Enterprise 9.2

WATCH HERE! Watch this Tech Talk to learn about the latest features and enhancements shipped in the new Splunk ...

Adoption of RUM and APM at Splunk

    Unleash the power of Splunk Observability   Watch Now In this can't miss Tech Talk! The Splunk Growth ...