<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Help with extracting JSON fields in Splunk Search</title>
    <link>https://community.splunk.com/t5/Splunk-Search/Help-with-extracting-JSON-fields/m-p/614335#M213477</link>
    <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/177801"&gt;@kranthimutyala&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;it's strange because it seems to be a json format.&lt;/P&gt;&lt;P&gt;Anyway, in this case you have some regex extraction like the following:&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;\"LogDate\":\s+\"(?&amp;lt;LogDate&amp;gt;[^\"]+)&lt;/LI-CODE&gt;&lt;P&gt;that you can test at&amp;nbsp;&lt;A href="https://regex101.com/r/IzcMqn/1" target="_blank"&gt;https://regex101.com/r/IzcMqn/1&lt;/A&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;and that you can replicate for all your fields.&lt;/P&gt;&lt;P&gt;Ciao.&lt;/P&gt;&lt;P&gt;Giuseppe&lt;/P&gt;</description>
    <pubDate>Fri, 23 Sep 2022 15:01:05 GMT</pubDate>
    <dc:creator>gcusello</dc:creator>
    <dc:date>2022-09-23T15:01:05Z</dc:date>
    <item>
      <title>Help with extracting JSON fields</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Help-with-extracting-JSON-fields/m-p/614290#M213452</link>
      <description>&lt;P&gt;Hi Team,&lt;BR /&gt;I have the event in the below format and want to extract the key-value pairs as fields.&lt;/P&gt;
&lt;P&gt;Please help extract fields from LogDate till the user.Thanks&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;LI-CODE lang="markup"&gt;{ [-]
   event: INFO  2022-09-23 11:49:59,033 [[MuleRuntime].uber.01: [papi-ust-email-notification-v1-uw-qa].get:\ping:Router.CPU_LITE @6c1fb7] org.mule.runtime.core.internal.processor.LoggerMessageProcessor: {
  "LogDate": "09/23/2022 16:11:13.932",
  "LogNo": "99",
  "LogLevel": "INFO",
  "LogType": "Process Level",
  "LogMessage": "Splunk anypoint log",
  "TimeTaken": "0:00:12.628",
  "ProcessName": "AnypointSplunkTest",
  "TaskName": "AnypointTest",
  "RPAEnvironment": "DEV",
  "LogId": "002308900.20250824210419999",
  "MachineName": "abc-xyz-efg",
  "User": "name.first"
}
   metaData: { [+]
   }
}&lt;/LI-CODE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;and this is the raw text&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN&gt;{"&lt;/SPAN&gt;&lt;SPAN class=""&gt;metaData&lt;/SPAN&gt;&lt;SPAN&gt;"&lt;/SPAN&gt;&lt;SPAN class=""&gt;:&lt;/SPAN&gt;&lt;SPAN&gt;{"&lt;/SPAN&gt;&lt;SPAN class=""&gt;sourceApiVersion&lt;/SPAN&gt;&lt;SPAN&gt;"&lt;/SPAN&gt;&lt;SPAN class=""&gt;:&lt;/SPAN&gt;&lt;SPAN&gt;"&lt;/SPAN&gt;&lt;SPAN class=""&gt;1.0.0-SNAPSHOT&lt;/SPAN&gt;&lt;SPAN&gt;","&lt;/SPAN&gt;&lt;SPAN class=""&gt;index&lt;/SPAN&gt;&lt;SPAN&gt;"&lt;/SPAN&gt;&lt;SPAN class=""&gt;:&lt;/SPAN&gt;&lt;SPAN&gt;"&lt;/SPAN&gt;&lt;SPAN class=""&gt;aas&lt;/SPAN&gt;&lt;SPAN&gt;","&lt;/SPAN&gt;&lt;SPAN class=""&gt;sourceApi&lt;/SPAN&gt;&lt;SPAN&gt;"&lt;/SPAN&gt;&lt;SPAN class=""&gt;:&lt;/SPAN&gt;&lt;SPAN&gt;"&lt;/SPAN&gt;&lt;SPAN class=""&gt;papi-cust-email-notification-v1-uw-qa&lt;/SPAN&gt;&lt;SPAN&gt;","&lt;/SPAN&gt;&lt;SPAN class=""&gt;cloudhubEnvironment&lt;/SPAN&gt;&lt;SPAN&gt;"&lt;/SPAN&gt;&lt;SPAN class=""&gt;:&lt;/SPAN&gt;&lt;SPAN&gt;"&lt;/SPAN&gt;&lt;SPAN class=""&gt;AUTOMATION-QA&lt;/SPAN&gt;&lt;SPAN&gt;","&lt;/SPAN&gt;&lt;SPAN class=""&gt;tags&lt;/SPAN&gt;&lt;SPAN&gt;"&lt;/SPAN&gt;&lt;SPAN class=""&gt;:&lt;/SPAN&gt;&lt;SPAN&gt;""},"&lt;/SPAN&gt;&lt;SPAN class=""&gt;event&lt;/SPAN&gt;&lt;SPAN&gt;"&lt;/SPAN&gt;&lt;SPAN class=""&gt;:&lt;/SPAN&gt;&lt;SPAN&gt;"&lt;/SPAN&gt;&lt;SPAN class=""&gt;INFO&lt;/SPAN&gt; &lt;SPAN class=""&gt;2022-09-23&lt;/SPAN&gt; &lt;SPAN class=""&gt;11:49:59&lt;/SPAN&gt;&lt;SPAN&gt;,&lt;/SPAN&gt;&lt;SPAN class=""&gt;033&lt;/SPAN&gt;&lt;SPAN&gt; [[&lt;/SPAN&gt;&lt;SPAN class=""&gt;MuleRuntime&lt;/SPAN&gt;&lt;SPAN&gt;]&lt;/SPAN&gt;&lt;SPAN class=""&gt;.uber.01:&lt;/SPAN&gt;&lt;SPAN&gt; [&lt;/SPAN&gt;&lt;SPAN class=""&gt;papi-cust-email-notification-v1-uw2-qa&lt;/SPAN&gt;&lt;SPAN&gt;]&lt;/SPAN&gt;&lt;SPAN class=""&gt;.get:\\ping:Router.CPU_LITE&lt;/SPAN&gt; &lt;SPAN class=""&gt;@6f3b7&lt;/SPAN&gt;&lt;SPAN&gt;] &lt;/SPAN&gt;&lt;SPAN class=""&gt;&lt;SPAN class=""&gt;org.mule.runtime.core.internal.processor.LoggerMessageProcessor&lt;/SPAN&gt;:&lt;/SPAN&gt;&lt;SPAN&gt; {&lt;/SPAN&gt;&lt;SPAN class=""&gt;\n&lt;/SPAN&gt; &lt;SPAN class=""&gt;\&lt;/SPAN&gt;&lt;SPAN&gt;"&lt;/SPAN&gt;&lt;SPAN class=""&gt;LogDate\&lt;/SPAN&gt;&lt;SPAN&gt;"&lt;/SPAN&gt;&lt;SPAN class=""&gt;:&lt;/SPAN&gt; &lt;SPAN class=""&gt;\&lt;/SPAN&gt;&lt;SPAN&gt;"&lt;/SPAN&gt;&lt;SPAN class=""&gt;09/23/2022&lt;/SPAN&gt; &lt;SPAN class=""&gt;16:11:13.932\&lt;/SPAN&gt;&lt;SPAN&gt;",&lt;/SPAN&gt;&lt;SPAN class=""&gt;\n&lt;/SPAN&gt; &lt;SPAN class=""&gt;\&lt;/SPAN&gt;&lt;SPAN&gt;"&lt;/SPAN&gt;&lt;SPAN class=""&gt;LogNo\&lt;/SPAN&gt;&lt;SPAN&gt;"&lt;/SPAN&gt;&lt;SPAN class=""&gt;:&lt;/SPAN&gt; &lt;SPAN class=""&gt;\&lt;/SPAN&gt;&lt;SPAN&gt;"&lt;/SPAN&gt;&lt;SPAN class=""&gt;99\&lt;/SPAN&gt;&lt;SPAN&gt;",&lt;/SPAN&gt;&lt;SPAN class=""&gt;\n&lt;/SPAN&gt; &lt;SPAN class=""&gt;\&lt;/SPAN&gt;&lt;SPAN&gt;"&lt;/SPAN&gt;&lt;SPAN class=""&gt;LogLevel\&lt;/SPAN&gt;&lt;SPAN&gt;"&lt;/SPAN&gt;&lt;SPAN class=""&gt;:&lt;/SPAN&gt; &lt;SPAN class=""&gt;\&lt;/SPAN&gt;&lt;SPAN&gt;"&lt;/SPAN&gt;&lt;SPAN class=""&gt;INFO\&lt;/SPAN&gt;&lt;SPAN&gt;",&lt;/SPAN&gt;&lt;SPAN class=""&gt;\n&lt;/SPAN&gt; &lt;SPAN class=""&gt;\&lt;/SPAN&gt;&lt;SPAN&gt;"&lt;/SPAN&gt;&lt;SPAN class=""&gt;LogType\&lt;/SPAN&gt;&lt;SPAN&gt;"&lt;/SPAN&gt;&lt;SPAN class=""&gt;:&lt;/SPAN&gt; &lt;SPAN class=""&gt;\&lt;/SPAN&gt;&lt;SPAN&gt;"&lt;/SPAN&gt;&lt;SPAN class=""&gt;Process&lt;/SPAN&gt; &lt;SPAN class=""&gt;Level\&lt;/SPAN&gt;&lt;SPAN&gt;",&lt;/SPAN&gt;&lt;SPAN class=""&gt;\n&lt;/SPAN&gt; &lt;SPAN class=""&gt;\&lt;/SPAN&gt;&lt;SPAN&gt;"&lt;/SPAN&gt;&lt;SPAN class=""&gt;LogMessage\&lt;/SPAN&gt;&lt;SPAN&gt;"&lt;/SPAN&gt;&lt;SPAN class=""&gt;:&lt;/SPAN&gt; &lt;SPAN class=""&gt;\&lt;/SPAN&gt;&lt;SPAN&gt;"&lt;/SPAN&gt;&lt;SPAN class=""&gt;Splunk&lt;/SPAN&gt; &lt;SPAN class=""&gt;anypoint&lt;/SPAN&gt; &lt;SPAN class=""&gt;log\&lt;/SPAN&gt;&lt;SPAN&gt;",&lt;/SPAN&gt;&lt;SPAN class=""&gt;\n&lt;/SPAN&gt; &lt;SPAN class=""&gt;\&lt;/SPAN&gt;&lt;SPAN&gt;"&lt;/SPAN&gt;&lt;SPAN class=""&gt;TimeTaken\&lt;/SPAN&gt;&lt;SPAN&gt;"&lt;/SPAN&gt;&lt;SPAN class=""&gt;:&lt;/SPAN&gt; &lt;SPAN class=""&gt;\&lt;/SPAN&gt;&lt;SPAN&gt;"&lt;/SPAN&gt;&lt;SPAN class=""&gt;0:00:12.628\&lt;/SPAN&gt;&lt;SPAN&gt;",&lt;/SPAN&gt;&lt;SPAN class=""&gt;\n&lt;/SPAN&gt; &lt;SPAN class=""&gt;\&lt;/SPAN&gt;&lt;SPAN&gt;"&lt;/SPAN&gt;&lt;SPAN class=""&gt;ProcessName\&lt;/SPAN&gt;&lt;SPAN&gt;"&lt;/SPAN&gt;&lt;SPAN class=""&gt;:&lt;/SPAN&gt; &lt;SPAN class=""&gt;\&lt;/SPAN&gt;&lt;SPAN&gt;"&lt;/SPAN&gt;&lt;SPAN class=""&gt;AnypointSplunkTest\&lt;/SPAN&gt;&lt;SPAN&gt;",&lt;/SPAN&gt;&lt;SPAN class=""&gt;\n&lt;/SPAN&gt; &lt;SPAN class=""&gt;\&lt;/SPAN&gt;&lt;SPAN&gt;"&lt;/SPAN&gt;&lt;SPAN class=""&gt;TaskName\&lt;/SPAN&gt;&lt;SPAN&gt;"&lt;/SPAN&gt;&lt;SPAN class=""&gt;:&lt;/SPAN&gt; &lt;SPAN class=""&gt;\&lt;/SPAN&gt;&lt;SPAN&gt;"&lt;/SPAN&gt;&lt;SPAN class=""&gt;AnypointTest\&lt;/SPAN&gt;&lt;SPAN&gt;",&lt;/SPAN&gt;&lt;SPAN class=""&gt;\n&lt;/SPAN&gt; &lt;SPAN class=""&gt;\&lt;/SPAN&gt;&lt;SPAN&gt;"&lt;/SPAN&gt;&lt;SPAN class=""&gt;RPAEnvironment\&lt;/SPAN&gt;&lt;SPAN&gt;"&lt;/SPAN&gt;&lt;SPAN class=""&gt;:&lt;/SPAN&gt; &lt;SPAN class=""&gt;\&lt;/SPAN&gt;&lt;SPAN&gt;"&lt;/SPAN&gt;&lt;SPAN class=""&gt;DEV\&lt;/SPAN&gt;&lt;SPAN&gt;",&lt;/SPAN&gt;&lt;SPAN class=""&gt;\n&lt;/SPAN&gt; &lt;SPAN class=""&gt;\&lt;/SPAN&gt;&lt;SPAN&gt;"&lt;/SPAN&gt;&lt;SPAN class=""&gt;LogId\&lt;/SPAN&gt;&lt;SPAN&gt;"&lt;/SPAN&gt;&lt;SPAN class=""&gt;:&lt;/SPAN&gt; &lt;SPAN class=""&gt;\&lt;/SPAN&gt;&lt;SPAN&gt;"&lt;/SPAN&gt;&lt;SPAN class=""&gt;002308900.20250824210419999\&lt;/SPAN&gt;&lt;SPAN&gt;",&lt;/SPAN&gt;&lt;SPAN class=""&gt;\n&lt;/SPAN&gt; &lt;SPAN class=""&gt;\&lt;/SPAN&gt;&lt;SPAN&gt;"&lt;/SPAN&gt;&lt;SPAN class=""&gt;MachineName\&lt;/SPAN&gt;&lt;SPAN&gt;"&lt;/SPAN&gt;&lt;SPAN class=""&gt;:&lt;/SPAN&gt; &lt;SPAN class=""&gt;\&lt;/SPAN&gt;&lt;SPAN&gt;"abc-xyz-wd&lt;/SPAN&gt;&lt;SPAN class=""&gt;\&lt;/SPAN&gt;&lt;SPAN&gt;",&lt;/SPAN&gt;&lt;SPAN class=""&gt;\n&lt;/SPAN&gt; &lt;SPAN class=""&gt;\&lt;/SPAN&gt;&lt;SPAN&gt;"&lt;/SPAN&gt;&lt;SPAN class=""&gt;User\&lt;/SPAN&gt;&lt;SPAN&gt;"&lt;/SPAN&gt;&lt;SPAN class=""&gt;:&lt;/SPAN&gt; &lt;SPAN class=""&gt;\&lt;/SPAN&gt;&lt;SPAN&gt;"name.first&lt;/SPAN&gt;&lt;SPAN class=""&gt;\&lt;/SPAN&gt;&lt;SPAN&gt;"&lt;/SPAN&gt;&lt;SPAN class=""&gt;\n&lt;/SPAN&gt;&lt;SPAN&gt;}"}&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 23 Sep 2022 12:16:44 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Help-with-extracting-JSON-fields/m-p/614290#M213452</guid>
      <dc:creator>kranthimutyala</dc:creator>
      <dc:date>2022-09-23T12:16:44Z</dc:date>
    </item>
    <item>
      <title>Re: Help with extracting JSON fields</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Help-with-extracting-JSON-fields/m-p/614321#M213469</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/177801"&gt;@kranthimutyala&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;this seems to be a json log, did you tried using spath command (&lt;A href="https://docs.splunk.com/Documentation/Splunk/latest/SearchReference/spath)?" target="_blank"&gt;https://docs.splunk.com/Documentation/Splunk/latest/SearchReference/spath)?&lt;/A&gt;&lt;/P&gt;&lt;P&gt;Ciao.&lt;/P&gt;&lt;P&gt;Giuseppe&lt;/P&gt;</description>
      <pubDate>Fri, 23 Sep 2022 13:58:49 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Help-with-extracting-JSON-fields/m-p/614321#M213469</guid>
      <dc:creator>gcusello</dc:creator>
      <dc:date>2022-09-23T13:58:49Z</dc:date>
    </item>
    <item>
      <title>Re: Help with extracting JSON fields</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Help-with-extracting-JSON-fields/m-p/614329#M213472</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/161352"&gt;@gcusello&lt;/a&gt;&amp;nbsp;I tried Spath to extract them but unsuccessful.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 23 Sep 2022 14:31:37 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Help-with-extracting-JSON-fields/m-p/614329#M213472</guid>
      <dc:creator>kranthimutyala</dc:creator>
      <dc:date>2022-09-23T14:31:37Z</dc:date>
    </item>
    <item>
      <title>Re: Help with extracting JSON fields</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Help-with-extracting-JSON-fields/m-p/614335#M213477</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/177801"&gt;@kranthimutyala&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;it's strange because it seems to be a json format.&lt;/P&gt;&lt;P&gt;Anyway, in this case you have some regex extraction like the following:&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;\"LogDate\":\s+\"(?&amp;lt;LogDate&amp;gt;[^\"]+)&lt;/LI-CODE&gt;&lt;P&gt;that you can test at&amp;nbsp;&lt;A href="https://regex101.com/r/IzcMqn/1" target="_blank"&gt;https://regex101.com/r/IzcMqn/1&lt;/A&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;and that you can replicate for all your fields.&lt;/P&gt;&lt;P&gt;Ciao.&lt;/P&gt;&lt;P&gt;Giuseppe&lt;/P&gt;</description>
      <pubDate>Fri, 23 Sep 2022 15:01:05 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Help-with-extracting-JSON-fields/m-p/614335#M213477</guid>
      <dc:creator>gcusello</dc:creator>
      <dc:date>2022-09-23T15:01:05Z</dc:date>
    </item>
    <item>
      <title>Re: Help with extracting JSON fields</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Help-with-extracting-JSON-fields/m-p/614363#M213487</link>
      <description>&lt;P&gt;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/177801"&gt;@kranthimutyala&lt;/a&gt;&amp;nbsp;When you say "unsuccessful", you need to illustrate the output and explain why you consider it unsuccessful. (Perhaps you could have explained this in the first problem statement.)&lt;/P&gt;&lt;P&gt;As&amp;nbsp;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/161352"&gt;@gcusello&lt;/a&gt;&amp;nbsp;said, your data is compliant JSON, so Splunk&amp;nbsp;&lt;EM&gt;should&lt;/EM&gt;&amp;nbsp;already have given a field "&lt;FONT face="andale mono,times"&gt;event&lt;/FONT&gt;" - which itself is a combination of free text with an embedded compliant JSON object like the following&lt;/P&gt;&lt;P class="lia-indent-padding-left-30px"&gt;&lt;SPAN&gt;INFO 2022-09-23 11:49:59,033 [[MuleRuntime].uber.01: [papi-cust-email-notification-v1-uw2-qa].get:\ping:Router.CPU_LITE @6f3b7] org.mule.runtime.core.internal.processor.LoggerMessageProcessor: { "LogDate": "09/23/2022 16:11:13.932", "LogNo": "99", "LogLevel": "INFO", "LogType": "Process Level", "LogMessage": "Splunk anypoint log", "TimeTaken": "0:00:12.628", "ProcessName": "AnypointSplunkTest", "TaskName": "AnypointTest", "RPAEnvironment": "DEV", "LogId": "002308900.20250824210419999", "MachineName": "abc-xyz-wd", "User": "name.first" }&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;Here, you just need to extract that JSON object, then apply spath.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;| eval LOG = replace(event, "^[^{]+", "")
| spath input=LOG&lt;/LI-CODE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Your sample data now gives&lt;/P&gt;&lt;TABLE&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TD width="277.875px" height="25px"&gt;LOG&lt;/TD&gt;&lt;TD width="106.71875px" height="25px"&gt;LogDate&lt;/TD&gt;&lt;TD width="263.71875px" height="25px"&gt;LogId&lt;/TD&gt;&lt;TD width="46.328125px" height="25px"&gt;LogLevel&lt;/TD&gt;&lt;TD width="74.15625px" height="25px"&gt;LogMessage&lt;/TD&gt;&lt;TD width="40px" height="25px"&gt;LogNo&lt;/TD&gt;&lt;TD width="68.890625px" height="25px"&gt;LogType&lt;/TD&gt;&lt;TD width="43.40625px" height="25px"&gt;MachineName&lt;/TD&gt;&lt;TD width="156.21875px" height="25px"&gt;ProcessName&lt;/TD&gt;&lt;TD width="41.5625px" height="25px"&gt;RPAEnvironment&lt;/TD&gt;&lt;TD width="106.625px" height="25px"&gt;TaskName&lt;/TD&gt;&lt;TD width="97.125px" height="25px"&gt;TimeTaken&lt;/TD&gt;&lt;TD width="83.234375px" height="25px"&gt;&amp;nbsp;&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD width="277.875px" height="267px"&gt;{ "LogDate": "09/23/2022 16:11:13.932", "LogNo": "99", "LogLevel": "INFO", "LogType": "Process Level", "LogMessage": "Splunk anypoint log", "TimeTaken": "0:00:12.628", "ProcessName": "AnypointSplunkTest", "TaskName": "AnypointTest", "RPAEnvironment": "DEV", "LogId": "002308900.20250824210419999", "MachineName": "abc-xyz-wd", "User": "name.first" }&lt;/TD&gt;&lt;TD width="106.71875px" height="267px"&gt;09/23/2022 16:11:13.932&lt;/TD&gt;&lt;TD width="263.71875px" height="267px"&gt;002308900.20250824210419999&lt;/TD&gt;&lt;TD width="46.328125px" height="267px"&gt;INFO&lt;/TD&gt;&lt;TD width="74.15625px" height="267px"&gt;Splunk anypoint log&lt;/TD&gt;&lt;TD width="40px" height="267px"&gt;99&lt;/TD&gt;&lt;TD width="68.890625px" height="267px"&gt;Process Level&lt;/TD&gt;&lt;TD width="43.40625px" height="267px"&gt;abc-xyz-wd&lt;/TD&gt;&lt;TD width="156.21875px" height="267px"&gt;AnypointSplunkTest&lt;/TD&gt;&lt;TD width="41.5625px" height="267px"&gt;DEV&lt;/TD&gt;&lt;TD width="106.625px" height="267px"&gt;AnypointTest&lt;/TD&gt;&lt;TD width="97.125px" height="267px"&gt;0If:00:12.628&lt;/TD&gt;&lt;TD width="83.234375px" height="267px"&gt;name.first&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;DIV class=""&gt;If Splunk doesn't give you &lt;EM&gt;&lt;FONT face="andale mono,times"&gt;event&lt;/FONT&gt;&lt;/EM&gt; field, apply spath first to extract &lt;FONT face="andale mono,times"&gt;event&lt;/FONT&gt;.&lt;/DIV&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;| spath
| eval LOG = replace(event, "^[^{]+", "")
| spath input=LOG​&lt;/LI-CODE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 23 Sep 2022 18:07:32 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Help-with-extracting-JSON-fields/m-p/614363#M213487</guid>
      <dc:creator>yuanliu</dc:creator>
      <dc:date>2022-09-23T18:07:32Z</dc:date>
    </item>
    <item>
      <title>Re: Help with extracting JSON fields</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Help-with-extracting-JSON-fields/m-p/614369#M213491</link>
      <description>&lt;P&gt;This should work:&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;| rex "(?&amp;lt;_raw&amp;gt;\"LogDate[^\}]*)"
| rex field=_raw mode=sed "s/(\"|\\\\n)//g"
| extract pairdelim="," kvdelim=":"&lt;/LI-CODE&gt;</description>
      <pubDate>Fri, 23 Sep 2022 18:37:42 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Help-with-extracting-JSON-fields/m-p/614369#M213491</guid>
      <dc:creator>johnhuang</dc:creator>
      <dc:date>2022-09-23T18:37:42Z</dc:date>
    </item>
  </channel>
</rss>

