<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Extract an value from logged sentence in Splunk Search</title>
    <link>https://community.splunk.com/t5/Splunk-Search/Extract-an-value-from-logged-sentence/m-p/499103#M139022</link>
    <description>&lt;P&gt;Add this to your SPL and replace &lt;CODE&gt;FIELD_NAME&lt;/CODE&gt; with your actual field name. I'd recommend fixing the logging to remove that space after value so Splunk can create the key value pair automatically without manually extracting &lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;| rex value\=\s(?&amp;lt;FIELD_NAME&amp;gt;/d+)
&lt;/CODE&gt;&lt;/PRE&gt;</description>
    <pubDate>Thu, 14 May 2020 14:07:42 GMT</pubDate>
    <dc:creator>skoelpin</dc:creator>
    <dc:date>2020-05-14T14:07:42Z</dc:date>
    <item>
      <title>Extract an value from logged sentence</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Extract-an-value-from-logged-sentence/m-p/499102#M139021</link>
      <description>&lt;P&gt;Hi,&lt;BR /&gt;
I'm trying to make a Splunk panel display a value from a log that gets added to every 4 minutes.&lt;BR /&gt;
I need to be able to see on the dashboard if the value suddenly drops. &lt;BR /&gt;
I've tried extracting the value, but it keeps messing up. &lt;BR /&gt;
Should I use regex, or do I need to extract it in a different way?&lt;BR /&gt;
My goal is to only get the value after "value= " to return. &lt;/P&gt;

&lt;P&gt;This is how the data looks when it's imported into Splunk, each new line is a single event:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;2020-05-14T13:39:28.423Z, machine= wefqwr2312, value= 14
2020-05-14T13:40:29.003Z, machine= wefqwr2312, value= 14
2020-05-14T13:40:29.118Z, machine= wefqwr2312, value= 14
2020-05-14T13:41:28.316Z, machine= wefqwr2312, value= 14
2020-05-14T13:41:28.323Z, machine= wefqwr2312, value= 14
2020-05-14T13:45:48.032Z, machine= wefqwr2312, value= 14
2020-05-14T13:45:48.041Z, machine= wefqwr2312, value= 14
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;Thanks!&lt;/P&gt;</description>
      <pubDate>Thu, 14 May 2020 13:56:19 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Extract-an-value-from-logged-sentence/m-p/499102#M139021</guid>
      <dc:creator>j3r0n</dc:creator>
      <dc:date>2020-05-14T13:56:19Z</dc:date>
    </item>
    <item>
      <title>Re: Extract an value from logged sentence</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Extract-an-value-from-logged-sentence/m-p/499103#M139022</link>
      <description>&lt;P&gt;Add this to your SPL and replace &lt;CODE&gt;FIELD_NAME&lt;/CODE&gt; with your actual field name. I'd recommend fixing the logging to remove that space after value so Splunk can create the key value pair automatically without manually extracting &lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;| rex value\=\s(?&amp;lt;FIELD_NAME&amp;gt;/d+)
&lt;/CODE&gt;&lt;/PRE&gt;</description>
      <pubDate>Thu, 14 May 2020 14:07:42 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Extract-an-value-from-logged-sentence/m-p/499103#M139022</guid>
      <dc:creator>skoelpin</dc:creator>
      <dc:date>2020-05-14T14:07:42Z</dc:date>
    </item>
    <item>
      <title>Re: Extract an value from logged sentence</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Extract-an-value-from-logged-sentence/m-p/499104#M139023</link>
      <description>&lt;P&gt;Thanks alot for your reply!&lt;BR /&gt;
I've edited the logging now, without the space after value. &lt;BR /&gt;
Do I need a different rex now? And the extracted field of which I put the name  in the regex, only has to be the "16" instead of "value=16" right?&lt;/P&gt;</description>
      <pubDate>Thu, 14 May 2020 14:28:08 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Extract-an-value-from-logged-sentence/m-p/499104#M139023</guid>
      <dc:creator>j3r0n</dc:creator>
      <dc:date>2020-05-14T14:28:08Z</dc:date>
    </item>
    <item>
      <title>Re: Extract an value from logged sentence</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Extract-an-value-from-logged-sentence/m-p/499105#M139024</link>
      <description>&lt;P&gt;Nothing further needed! Splunk will identify key value pairs automatically and extract them out for you. Splunk looks for common delimiters such as the &lt;CODE&gt;:&lt;/CODE&gt; or &lt;CODE&gt;=&lt;/CODE&gt; and identifies everything on the left side as the field and everything on the right side as the value. Keep it in the format of &lt;CODE&gt;value=14&lt;/CODE&gt;&lt;/P&gt;

&lt;P&gt;Once it has a little run time, go look at your fields on the left and find the field &lt;CODE&gt;value&lt;/CODE&gt; to verify it extracts properly &lt;/P&gt;</description>
      <pubDate>Thu, 14 May 2020 14:30:11 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Extract-an-value-from-logged-sentence/m-p/499105#M139024</guid>
      <dc:creator>skoelpin</dc:creator>
      <dc:date>2020-05-14T14:30:11Z</dc:date>
    </item>
  </channel>
</rss>

