Splunk Search

Simple regex extraction not working?

eid1550
New Member

Hi.

 

I have an event that has the line "Total time taken for process: 535 ms" in it.

 

it's not in a field it's just a raw event. I want to extract just the 535 ms from it, and so I came up with this.

 

index = *"1500"* "Total time taken for process:" | regex _raw "\d+ ms" 

its the correct regular expression any number of digits followed by space followed by ms but its not working in splunk, and I am not sure why. it keeps throwing error

 

Usage: regex <field> (=!=) <regex>

I am not sure what this means. 

Labels (1)
0 Karma

ITWhisperer
SplunkTrust
SplunkTrust

regex will filter events based on matching the expression to the field. If you want to extract the data into another field, you need to use the rex command (by default it works on the _raw field)

index = *"1500"* "Total time taken for process:" | rex "Total time taken for process: (?<time>\d+) ms" 

 

0 Karma
Get Updates on the Splunk Community!

Introducing the Splunk Community Dashboard Challenge!

Welcome to Splunk Community Dashboard Challenge! This is your chance to showcase your skills in creating ...

Get the T-shirt to Prove You Survived Splunk University Bootcamp

As if Splunk University, in Las Vegas, in-person, with three days of bootcamps and labs weren’t enough, now ...

Wondering How to Build Resiliency in the Cloud?

IT leaders are choosing Splunk Cloud as an ideal cloud transformation platform to drive business resilience,  ...