Dashboards & Visualizations

Field Extraction

sahana
Engager

Hi

I have requirement to fetch the some value like asf55-hsgf-56bj4b-rdhh-5b4f, this values are sent from the applications in two different ways like 

1)message: dhgfsjd{endbjjdfg, country=hongkong, server=gvfhsd, idVal=asf55-hsgf-56bj4b-rdhh-5b4f, error=gvrf hdfhdsf, errorCode=47574}

The another format is

2)message: dhgfsjd{endbjjdfg, country=[hongkong], server=[gvfhsd], idVal=[asf55-hsgf-56bj4b-rdhh-5b4f], error=[gvrf hdfhdsf], errorCode=[47574]}

I was suppose to extract the idval value which should satisfy the above case.

 

I have tried with below rex command,

 

|rex field = message "(idVal={1}(?P<ppid>.+?,))" | eval value =split(ppid,",")

output :asf55-hsgf-56bj4b-rdhh-5b4f

 

the above command is working fine for first case alone but we have the logs with second case it returns output as [asf55-hsgf-56bj4b-rdhh-5b4f]

0 Karma

isoutamo
SplunkTrust
SplunkTrust

Hi

you can replace your rex string to this and remove last eval at the same time

| rex field=message "idVal=\[?(?P<ppid>.+?)\]?,"

r. Ismo 

0 Karma
Get Updates on the Splunk Community!

Unlock Database Monitoring with Splunk Observability Cloud

  In today’s fast-paced digital landscape, even minor database slowdowns can disrupt user experiences and ...

Purpose in Action: How Splunk Is Helping Power an Inclusive Future for All

At Cisco, purpose isn’t a tagline—it’s a commitment. Cisco’s FY25 Purpose Report outlines how the company is ...

[Upcoming Webinar] Demo Day: Transforming IT Operations with Splunk

Join us for a live Demo Day at the Cisco Store on January 21st 10:00am - 11:00am PST In the fast-paced world ...