Getting Data In

How do you Filter events from Json?

ppanchal
Path Finder

Below is my JSON. I want to display all events where responseTime >11.

Please assist.

log:    {   [-] 
         actionCd:   Update 
         appSourceCd:    MAS    
         appTargetCd:    OCS    
         contextID:  daa095c0-6e9b-1abf-970a-fffffc8664b7   
         correlateID:    1149623816 
         customUID:  05248008   
         interfaceName:  wm_businessservices.customerService.flowServices:publishSvcReqEvents   
         requestTypeCd:  SvcReq2    
         responseTime:   9  

Vijeta
Influencer

If you use sourcetype as pre-defined for json in splunk it should be auto extracted. Else you will have to create field extractions or regex.

0 Karma

alonsocaio
Contributor

You can try to extract new fields for this events, in this case, you will need to extract the responseTime field.

It is possible to extract new fields using regex or delimiters, and you can access the extraction field menu by clicking in Event Actions -> Extract Fields, in the result of your search.

If it works, you will be able to filter your search using the new extracted field.

0 Karma

alonsocaio
Contributor

Have you tried to extract the fields you need to your search?

0 Karma
Get Updates on the Splunk Community!

Unlock Database Monitoring with Splunk Observability Cloud

  In today’s fast-paced digital landscape, even minor database slowdowns can disrupt user experiences and ...

Purpose in Action: How Splunk Is Helping Power an Inclusive Future for All

At Cisco, purpose isn’t a tagline—it’s a commitment. Cisco’s FY25 Purpose Report outlines how the company is ...

[Upcoming Webinar] Demo Day: Transforming IT Operations with Splunk

Join us for a live Demo Day at the Cisco Store on January 21st 10:00am - 11:00am PST In the fast-paced world ...