Splunk Dev

Extract selected fields from .txt

vickram
New Member

Hi All,
I Need to extract " CURDEPTH(553)" and "MAXDEPTH(15000)" as two seperate fields from the below .txt file (below is the sample stanza). Can you please help.

Thanks in advance.

1 : dis ql('PAPL.ESB.FDS.DELIVERYCONSTRUCT.QUEUE.ESBFDSIns1') curdepth,maxdepth
AMQ8409: Display Queue details.
QUEUE(PAPL.ESB.FDS.DELIVERYCONSTRUCT.QUEUE.ESBFDSIns1)
TYPE(QLOCAL) CURDEPTH(553)
MAXDEPTH(15000)

One MQSC command read.
No commands have a syntax error.
All valid MQSC commands were processed.
5724-H72 (C) Copyright IBM Corp. 1994, 2015.
Starting MQSC for queue manager PAPL_ESB_FDS_PRD_QM_223.

0 Karma
1 Solution

vik_splunk
Communicator

HI @vickram , The below should work for you.

<base search>|rex "(?i)MAXDEPTH\((?P<Maxdepth>[^\)]+)"|rex "(?i)CURDEPTH\((?P<Curdepth>[^\)]+)"|stats count by Maxdepth,Curdepth

View solution in original post

0 Karma

vickram
New Member

index=aiam_mywizard_esb_queuedepth_analysis
|rex "(?i)MAXDEPTH((?P[^)]+)"
|rex "(?i)CURDEPTH((?P[^)]+)"
|rex "(?i)QUEUE((?P[^)]+)"
|rex "(?i)TYPE((?P[^)]+)"
| table Maxdepth Curdepth Queue type

Thanks for the help. I have made the above query. I need to calculate the percentage of the "Maxdepth" field and compare with the "Curdepth" field and find the event When the "Curdepth" reaches 75% of the "Maxdepth".
Can you please help on this.

0 Karma

vik_splunk
Communicator

HI @vickram , The below should work for you.

<base search>|rex "(?i)MAXDEPTH\((?P<Maxdepth>[^\)]+)"|rex "(?i)CURDEPTH\((?P<Curdepth>[^\)]+)"|stats count by Maxdepth,Curdepth

0 Karma

vickram
New Member

Thanks for the help vik

0 Karma

vickram
New Member

index=aiam_mywizard_esb_queuedepth_analysis
|rex "(?i)MAXDEPTH((?P[^)]+)"
|rex "(?i)CURDEPTH((?P[^)]+)"
|rex "(?i)QUEUE((?P[^)]+)"
|rex "(?i)TYPE((?P[^)]+)"
| table Maxdepth Curdepth Queue type

Thanks for the help. I have made the above query. I need to calculate the percentage of the "Maxdepth" field and compare with the "Curdepth" field and find the event When the "Curdepth" reaches 75% of the "Maxdepth".
Can you please help on this.

0 Karma

vik_splunk
Communicator

Add the below after the current query @vickram

|eval Percentage=(Curdepth/Maxdepth)*100|where Percentage>=75
0 Karma

diogofgm
SplunkTrust
SplunkTrust

In search you can use:

| rex "CURDEPTH\((?<cur_depth>[^\)]+)\)"
| rex "MAXDEPTH\((?<max_depth>[^\)]+)\)"

in props you can use the same regex in a EXTRACT-field = ...

------------
Hope I was able to help you. If so, some karma would be appreciated.
0 Karma

vickram
New Member

Works perfectly 😉 thanks much

0 Karma

vickram
New Member

index=aiam_mywizard_esb_queuedepth_analysis
|rex "(?i)MAXDEPTH((?P[^)]+)"
|rex "(?i)CURDEPTH((?P[^)]+)"
|rex "(?i)QUEUE((?P[^)]+)"
|rex "(?i)TYPE((?P[^)]+)"
| table Maxdepth Curdepth Queue type

Thanks for the help. I have made the above query. I need to calculate the percentage of the "Maxdepth" field and compare with the "Curdepth" field and find the event When the "Curdepth" reaches 75% of the "Maxdepth".
Can you please help on this.

0 Karma
Get Updates on the Splunk Community!

Stay Connected: Your Guide to May Tech Talks, Office Hours, and Webinars!

Take a look below to explore our upcoming Community Office Hours, Tech Talks, and Webinars this month. This ...

They're back! Join the SplunkTrust and MVP at .conf24

With our highly anticipated annual conference, .conf, comes the fez-wearers you can trust! The SplunkTrust, as ...

Enterprise Security Content Update (ESCU) | New Releases

Last month, the Splunk Threat Research Team had two releases of new security content via the Enterprise ...