<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: How to extract some fields from a part json part text log in Splunk in Splunk Search</title>
    <link>https://community.splunk.com/t5/Splunk-Search/How-to-extract-some-fields-from-a-part-json-part-text-log-in/m-p/540277#M152835</link>
    <description>&lt;P&gt;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/225168"&gt;@ITWhisperer&lt;/a&gt;&amp;nbsp; Thank you for helping me out here. Much Appreciated.&lt;BR /&gt;So the latest query brought the below two events&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;021-02-14 00:00:04,499 [[bapm2DQ].bapmprojectFlow.stage1.02] INFO&lt;BR /&gt;com.growl.hdt.dmt.DQ.bapm.ComparebapmDQRecords - List of Applications in DQ to be marked "Obsolete in bapm":&lt;BR /&gt;2021-02-14 00:00:03,274 [[bapm2DQ].bapmprojectFlow.stage1.04] INFO&lt;BR /&gt;com.growl.hdt.dmt.DQ.bapm.ComparebapmDQRecords - List of Applications in DQ to be marked "Obsolete in bapm":&lt;BR /&gt;&lt;BR /&gt;But It didn't bring the other search items.&lt;/P&gt;&lt;P&gt;Also, in the above the application names are missing i.e it didn't show the entire line as below:&lt;BR /&gt;List of Applications in DQ to be marked "Obsolete in bapm":[AD00007661, AD00007470, AD00007539, AD00007549, AD00007643]&lt;/P&gt;</description>
    <pubDate>Wed, 17 Feb 2021 16:17:18 GMT</pubDate>
    <dc:creator>bhartiya007</dc:creator>
    <dc:date>2021-02-17T16:17:18Z</dc:date>
    <item>
      <title>How to extract some fields from a part json part text log in Splunk</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-extract-some-fields-from-a-part-json-part-text-log-in/m-p/540229#M152812</link>
      <description>&lt;P&gt;&lt;SPAN&gt;I am fairly new to splunk and still learning. I have a splunk event which is a mix of some texts and json in between. (This isn't the complete log)&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;2021-02-14 00:00:03,596 [[bapm2DQ].bapmprojectFlow.stage1.02] INFO  com.growl.hdt.dmt.DQ.bapm.RetrieveDataFromDQ - Total Application assets -&amp;gt; 1692
2021-02-14 00:00:03,596 [[bapm2DQ].bapmprojectFlow.stage1.02] INFO  com.growl.hdt.dmt.DQ.bapm.CommonUtils - {"Header":{"AppId":"AD00006933","Type":"Inbound","RecId":"416c627c-41a7-428e-a871-5317c4842fe5","StartTS":"2021-02-14T05:00Z","Ver":"2.0.0"},"Application":{"APP_OS":"Linux 3.10.0-1160.11.1.el7.x86_64","APP_Runtime":"Java 1.8.0_282","APP_AppName":"DQ-bapm-Integration","APP_AppVersion":"1.0.0","Host":"zebra.cdc.growl.com/10.102.180.53","Channel":"Other"},"Service":{"Key":"DQ2bapm","URL":"https://growl-test.DQ.com/rest/2.0/assets?limit=1000&amp;amp;offset=1000&amp;amp;typeId=00000000-0000-0000-0000-000000031302&amp;amp;communityId=595b27d3-ff42-45e4-8dc7-0172f7d82693&amp;amp;domainId=2c8b39ea-0d7f-445f-acc2-a1fb3a9a12db&amp;amp;statusId=00000000-0000-0000-0000-000000005009","CallType":"REST","Operation":"GET"},"Results":{"Elapsed":"0","Message":"Invoking DQ REST API","TraceLevel":"DEBUG"},"Security":{"Vendor":"growl"}}
2021-02-14 00:00:03,795 [[bapm2DQ].bapmprojectFlow.stage1.02] INFO  com.growl.hdt.dmt.DQ.bapm.RetrieveDataFromDQ - Total Application assets -&amp;gt; 1692
2021-02-14 00:00:03,795 [[bapm2DQ].bapmprojectFlow.stage1.02] INFO  com.growl.hdt.dmt.DQ.bapm.RetrieveDataFromDQ - Total Application assets in appAssetList-&amp;gt; 1692
2021-02-14 00:00:04,499 [[bapm2DQ].bapmprojectFlow.stage1.02] INFO  com.growl.hdt.dmt.DQ.bapm.ComparebapmDQRecords - List of Applications in DQ to be marked "Obsolete in bapm": 
[AD00007661, AD00007470, AD00007539, AD00007549, AD00007643]
2021-02-14 00:00:04,499 [[bapm2DQ].bapmprojectFlow.stage1.02] INFO  com.growl.hdt.dmt.DQ.bapm.ComparebapmDQRecords - ## Total Application count from bapm ##1696
2021-02-14 00:00:04,499 [[bapm2DQ].bapmprojectFlow.stage1.02] INFO  com.growl.hdt.dmt.DQ.bapm.ComparebapmDQRecords - ## Total Application Asset in DQ ##1692
2021-02-14 00:00:04,499 [[bapm2DQ].bapmprojectFlow.stage1.02] INFO  com.growl.hdt.dmt.DQ.bapm.ComparebapmDQRecords - ## No of Application to Obsolete in DQ ##5&lt;/LI-CODE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;How can I extract the below :&lt;/P&gt;&lt;PRE&gt;List of Applications in DQ to be marked "Obsolete in bapm": 
[AD00007661, AD00007470, AD00007539, AD00007549, AD00007643]
Total Application count from bapm ##1696
Total Application Asset in DQ ##1692
No of Application to Obsolete in DQ ##5&lt;/PRE&gt;</description>
      <pubDate>Wed, 17 Feb 2021 11:25:29 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-extract-some-fields-from-a-part-json-part-text-log-in/m-p/540229#M152812</guid>
      <dc:creator>bhartiya007</dc:creator>
      <dc:date>2021-02-17T11:25:29Z</dc:date>
    </item>
    <item>
      <title>Re: How to extract some fields from a part json part text log in Splunk</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-extract-some-fields-from-a-part-json-part-text-log-in/m-p/540230#M152813</link>
      <description>&lt;P&gt;Are these separate events?&lt;/P&gt;&lt;P&gt;Can you just not add something to the search to just get the events you want&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;("List of Applications in DQ to be marked" OR "Total Application count from bapm" OR "Total Application Asset in DQ" OR "No of Application to Obsolete in DQ")&lt;/LI-CODE&gt;</description>
      <pubDate>Wed, 17 Feb 2021 11:34:59 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-extract-some-fields-from-a-part-json-part-text-log-in/m-p/540230#M152813</guid>
      <dc:creator>ITWhisperer</dc:creator>
      <dc:date>2021-02-17T11:34:59Z</dc:date>
    </item>
    <item>
      <title>Re: How to extract some fields from a part json part text log in Splunk</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-extract-some-fields-from-a-part-json-part-text-log-in/m-p/540232#M152814</link>
      <description>&lt;P&gt;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/225168"&gt;@ITWhisperer&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;No the info is coming in the same event.&lt;BR /&gt;I tried the below&amp;nbsp; but I am getting the full events instead of the fields and their respective values.&lt;BR /&gt;index=hdt sourcetype=hdt_dg_logs "List of Applications in DQ to be marked" OR "Total Application count from bapm" OR "Total Application Asset in DQ" OR "No of Application to Obsolete in DQ"&lt;BR /&gt;&lt;BR /&gt;I want something in the tabular format with the only the above counts.&lt;BR /&gt;Sorry If my requirement is not correct I am pretty new to these.&lt;/P&gt;</description>
      <pubDate>Wed, 17 Feb 2021 12:07:43 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-extract-some-fields-from-a-part-json-part-text-log-in/m-p/540232#M152814</guid>
      <dc:creator>bhartiya007</dc:creator>
      <dc:date>2021-02-17T12:07:43Z</dc:date>
    </item>
    <item>
      <title>Re: How to extract some fields from a part json part text log in Splunk</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-extract-some-fields-from-a-part-json-part-text-log-in/m-p/540233#M152815</link>
      <description>&lt;P&gt;I need to generate an alert with the format like below&lt;/P&gt;&lt;PRE&gt;List of Applications in DQ to be marked "Obsolete in bapm": 
[AD00007661, AD00007470, AD00007539, AD00007549, AD00007643]
Total Application count from bapm=1696
Total Application Asset in DQ =1692
No of Application to Obsolete in DQ =5&lt;/PRE&gt;</description>
      <pubDate>Wed, 17 Feb 2021 11:57:40 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-extract-some-fields-from-a-part-json-part-text-log-in/m-p/540233#M152815</guid>
      <dc:creator>bhartiya007</dc:creator>
      <dc:date>2021-02-17T11:57:40Z</dc:date>
    </item>
    <item>
      <title>Re: How to extract some fields from a part json part text log in Splunk</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-extract-some-fields-from-a-part-json-part-text-log-in/m-p/540234#M152816</link>
      <description>&lt;P&gt;It is probably worth splitting these lines into separate events? If you can't do this when ingesting the events, you could try&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;| rex max_match=0 "(?&amp;lt;line&amp;gt;.+\n)"
| mvexpand line
| fields - _raw&lt;/LI-CODE&gt;</description>
      <pubDate>Wed, 17 Feb 2021 12:11:15 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-extract-some-fields-from-a-part-json-part-text-log-in/m-p/540234#M152816</guid>
      <dc:creator>ITWhisperer</dc:creator>
      <dc:date>2021-02-17T12:11:15Z</dc:date>
    </item>
    <item>
      <title>Re: How to extract some fields from a part json part text log in Splunk</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-extract-some-fields-from-a-part-json-part-text-log-in/m-p/540236#M152818</link>
      <description>&lt;P&gt;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/225168"&gt;@ITWhisperer&lt;/a&gt;&amp;nbsp;&lt;BR /&gt;When I run this i get two events where these values exists.&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;index=hdt sourcetype=hdt_dg_logs "List of Applications in DQ to be marked" OR "Total Application count from bapm" OR "Total Application Asset in DQ" OR "No of Application to Obsolete in DQ"&lt;BR /&gt;&lt;BR /&gt;Do you want me to run this entire query?&amp;nbsp;&lt;BR /&gt;index=hdt sourcetype=hdt_dg_logs "List of Applications in DQ to be marked" OR "Total Application count from bapm" OR "Total Application Asset in DQ" OR "No of Application to Obsolete in DQ"&amp;nbsp;&amp;nbsp;| rex max_match=0 "(?&amp;lt;line&amp;gt;.+\n)"&lt;BR /&gt;| mvexpand line&lt;BR /&gt;| fields - _raw&lt;BR /&gt;&lt;BR /&gt;If not , I probably didn't get you here. can you please provide me the query to work with?&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 17 Feb 2021 12:43:44 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-extract-some-fields-from-a-part-json-part-text-log-in/m-p/540236#M152818</guid>
      <dc:creator>bhartiya007</dc:creator>
      <dc:date>2021-02-17T12:43:44Z</dc:date>
    </item>
    <item>
      <title>Re: How to extract some fields from a part json part text log in Splunk</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-extract-some-fields-from-a-part-json-part-text-log-in/m-p/540244#M152820</link>
      <description>&lt;LI-CODE lang="markup"&gt;index=hdt sourcetype=hdt_dg_logs 
| rex max_match=0 "(?&amp;lt;line&amp;gt;.+\n)"
| mvexpand line
| fields - _raw
| search "List of Applications in DQ to be marked" OR "Total Application count from bapm" OR "Total Application Asset in DQ" OR "No of Application to Obsolete in DQ"&lt;/LI-CODE&gt;&lt;P&gt;If you then want to get rid of the beginning part of the line you could do something like&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;| eval line=mvindex(split(line,"-"),3)&lt;/LI-CODE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 17 Feb 2021 13:29:57 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-extract-some-fields-from-a-part-json-part-text-log-in/m-p/540244#M152820</guid>
      <dc:creator>ITWhisperer</dc:creator>
      <dc:date>2021-02-17T13:29:57Z</dc:date>
    </item>
    <item>
      <title>Re: How to extract some fields from a part json part text log in Splunk</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-extract-some-fields-from-a-part-json-part-text-log-in/m-p/540256#M152825</link>
      <description>&lt;P&gt;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/225168"&gt;@ITWhisperer&lt;/a&gt;&amp;nbsp;&lt;BR /&gt;This isn't bringing any data/event.&lt;/P&gt;&lt;P&gt;index=hdt sourcetype=hdt_dg_logs | rex max_match=0 "(?&amp;lt;line&amp;gt;.+\n)" | mvexpand line | fields - _raw | search "List of Applications in DQ to be marked" OR "Total Application count from bapm" OR "Total Application Asset in DQ" OR "No of Application to Obsolete in DQ"&lt;/P&gt;</description>
      <pubDate>Wed, 17 Feb 2021 14:36:53 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-extract-some-fields-from-a-part-json-part-text-log-in/m-p/540256#M152825</guid>
      <dc:creator>bhartiya007</dc:creator>
      <dc:date>2021-02-17T14:36:53Z</dc:date>
    </item>
    <item>
      <title>Re: How to extract some fields from a part json part text log in Splunk</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-extract-some-fields-from-a-part-json-part-text-log-in/m-p/540257#M152826</link>
      <description>&lt;P&gt;Does the first part at least break it down into separate events?&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;index=hdt sourcetype=hdt_dg_logs 
| rex max_match=0 "(?&amp;lt;line&amp;gt;.+\n)"
| mvexpand line
| fields - _raw&lt;/LI-CODE&gt;</description>
      <pubDate>Wed, 17 Feb 2021 14:43:01 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-extract-some-fields-from-a-part-json-part-text-log-in/m-p/540257#M152826</guid>
      <dc:creator>ITWhisperer</dc:creator>
      <dc:date>2021-02-17T14:43:01Z</dc:date>
    </item>
    <item>
      <title>Re: How to extract some fields from a part json part text log in Splunk</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-extract-some-fields-from-a-part-json-part-text-log-in/m-p/540259#M152827</link>
      <description>&lt;P&gt;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/225168"&gt;@ITWhisperer&lt;/a&gt;&amp;nbsp;&lt;BR /&gt;The number of events have increased from 13 to 359 but the only thing i can see are the selected fields in those events index source and sourcetype&lt;/P&gt;</description>
      <pubDate>Wed, 17 Feb 2021 14:49:17 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-extract-some-fields-from-a-part-json-part-text-log-in/m-p/540259#M152827</guid>
      <dc:creator>bhartiya007</dc:creator>
      <dc:date>2021-02-17T14:49:17Z</dc:date>
    </item>
    <item>
      <title>Re: How to extract some fields from a part json part text log in Splunk</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-extract-some-fields-from-a-part-json-part-text-log-in/m-p/540260#M152828</link>
      <description>&lt;P&gt;Sorry - try this&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;index=hdt sourcetype=hdt_dg_logs 
| rex max_match=0 "(?&amp;lt;line&amp;gt;.+\n)"
| mvexpand line
| eval _raw=line
| fields - line
| search "List of Applications in DQ to be marked" OR "Total Application count from bapm" OR "Total Application Asset in DQ" OR "No of Application to Obsolete in DQ"&lt;/LI-CODE&gt;</description>
      <pubDate>Wed, 17 Feb 2021 14:56:37 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-extract-some-fields-from-a-part-json-part-text-log-in/m-p/540260#M152828</guid>
      <dc:creator>ITWhisperer</dc:creator>
      <dc:date>2021-02-17T14:56:37Z</dc:date>
    </item>
    <item>
      <title>Re: How to extract some fields from a part json part text log in Splunk</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-extract-some-fields-from-a-part-json-part-text-log-in/m-p/540277#M152835</link>
      <description>&lt;P&gt;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/225168"&gt;@ITWhisperer&lt;/a&gt;&amp;nbsp; Thank you for helping me out here. Much Appreciated.&lt;BR /&gt;So the latest query brought the below two events&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;021-02-14 00:00:04,499 [[bapm2DQ].bapmprojectFlow.stage1.02] INFO&lt;BR /&gt;com.growl.hdt.dmt.DQ.bapm.ComparebapmDQRecords - List of Applications in DQ to be marked "Obsolete in bapm":&lt;BR /&gt;2021-02-14 00:00:03,274 [[bapm2DQ].bapmprojectFlow.stage1.04] INFO&lt;BR /&gt;com.growl.hdt.dmt.DQ.bapm.ComparebapmDQRecords - List of Applications in DQ to be marked "Obsolete in bapm":&lt;BR /&gt;&lt;BR /&gt;But It didn't bring the other search items.&lt;/P&gt;&lt;P&gt;Also, in the above the application names are missing i.e it didn't show the entire line as below:&lt;BR /&gt;List of Applications in DQ to be marked "Obsolete in bapm":[AD00007661, AD00007470, AD00007539, AD00007549, AD00007643]&lt;/P&gt;</description>
      <pubDate>Wed, 17 Feb 2021 16:17:18 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-extract-some-fields-from-a-part-json-part-text-log-in/m-p/540277#M152835</guid>
      <dc:creator>bhartiya007</dc:creator>
      <dc:date>2021-02-17T16:17:18Z</dc:date>
    </item>
  </channel>
</rss>

