Splunk Search

Simple regex extraction not working?

eid1550
New Member

Hi.

 

I have an event that has the line "Total time taken for process: 535 ms" in it.

 

it's not in a field it's just a raw event. I want to extract just the 535 ms from it, and so I came up with this.

 

index = *"1500"* "Total time taken for process:" | regex _raw "\d+ ms" 

its the correct regular expression any number of digits followed by space followed by ms but its not working in splunk, and I am not sure why. it keeps throwing error

 

Usage: regex <field> (=!=) <regex>

I am not sure what this means. 

Labels (1)
0 Karma

ITWhisperer
SplunkTrust
SplunkTrust

regex will filter events based on matching the expression to the field. If you want to extract the data into another field, you need to use the rex command (by default it works on the _raw field)

index = *"1500"* "Total time taken for process:" | rex "Total time taken for process: (?<time>\d+) ms" 

 

0 Karma
Get Updates on the Splunk Community!

Stay Connected: Your Guide to May Tech Talks, Office Hours, and Webinars!

Take a look below to explore our upcoming Community Office Hours, Tech Talks, and Webinars this month. This ...

They're back! Join the SplunkTrust and MVP at .conf24

With our highly anticipated annual conference, .conf, comes the fez-wearers you can trust! The SplunkTrust, as ...

Enterprise Security Content Update (ESCU) | New Releases

Last month, the Splunk Threat Research Team had two releases of new security content via the Enterprise ...