All Apps and Add-ons

Regex for Field Extraction

robhorton
Explorer

I've been trying to create a regex to generate a field name without success. The data I'm attempting to parse looks like:

logsrv> Message server exiting.

I would like to make logsrv represent a subsystem so that my field is subsystem and logsrv is the data for that field.

So far I have the following expression that works on a regex tester: ^.*?(?=>)
but I'm missing something with Splunk since it won't return any results no matter I try. The field extractor doesn't have any luck either when I try to create the expression using logsrv from the results.

Please help.

0 Karma

Rob
Splunk Employee
Splunk Employee

Have you tried testing this out with the rex command in Splunk with the search language?

|rex field=_raw "^(?<subsystem>[^>]+)>"

I am not sure if that will work if your raw event has anything before the "logsrv>" in the event line such as a timestamp.

robhorton
Explorer

Thank you! You're right. The data has the timestamp on the previous line and splunk returns results with the time and logsrv combined.

Data:
27-Jun-13 19:34:37
logsrv> Message server exiting.

Result:
27-Jun-13 19:34:37 logsrv

Do I need to search for a preceding carriage return or pattern match the time?

Thanks again!

0 Karma
Get Updates on the Splunk Community!

More Control Over Your Monitoring Costs with Archived Metrics!

What if there was a way you could keep all the metrics data you need while saving on storage costs?This is now ...

New in Observability Cloud - Explicit Bucket Histograms

Splunk introduces native support for histograms as a metric data type within Observability Cloud with Explicit ...

Updated Team Landing Page in Splunk Observability

We’re making some changes to the team landing page in Splunk Observability, based on your feedback. The ...