Getting Data In

How do you Filter events from Json?

ppanchal
Path Finder

Below is my JSON. I want to display all events where responseTime >11.

Please assist.

log:    {   [-] 
         actionCd:   Update 
         appSourceCd:    MAS    
         appTargetCd:    OCS    
         contextID:  daa095c0-6e9b-1abf-970a-fffffc8664b7   
         correlateID:    1149623816 
         customUID:  05248008   
         interfaceName:  wm_businessservices.customerService.flowServices:publishSvcReqEvents   
         requestTypeCd:  SvcReq2    
         responseTime:   9  

Vijeta
Influencer

If you use sourcetype as pre-defined for json in splunk it should be auto extracted. Else you will have to create field extractions or regex.

0 Karma

alonsocaio
Contributor

You can try to extract new fields for this events, in this case, you will need to extract the responseTime field.

It is possible to extract new fields using regex or delimiters, and you can access the extraction field menu by clicking in Event Actions -> Extract Fields, in the result of your search.

If it works, you will be able to filter your search using the new extracted field.

0 Karma

alonsocaio
Contributor

Have you tried to extract the fields you need to your search?

0 Karma
Get Updates on the Splunk Community!

The OpenTelemetry Certified Associate (OTCA) Exam

What’s this OTCA exam? The Linux Foundation offers the OpenTelemetry Certified Associate (OTCA) credential to ...

From Manual to Agentic: Level Up Your SOC at Cisco Live

Welcome to the Era of the Agentic SOC   Are you tired of being a manual alert responder? The security ...

Splunk Classroom Chronicles: Training Tales and Testimonials (Episode 4)

Welcome back to Splunk Classroom Chronicles, our ongoing series where we shine a light on what really happens ...