Getting Data In

How do you extract fields from JSON logs?

moizmmz
Path Finder

Hello,

I have the following JSON log event:

{   [-] 
     line:   I 1019 15:40:22.873 UTC THREAD1: **linkerd 1.4.5** (rev=0280009ca71e0673108a3752763938017bda588f) built at 20180713-154546 
     source:     stderr 
     tag:    linkerd/e03c11099322   
}

I want to extract the version of Linkerd given in this log. i.e., I want the following result: Field name: Linkerd version; value: 1.4.5

Pls help!!

Tags (2)
0 Karma
1 Solution

493669
Super Champion

try this regex to extract linkerd version-

   ... |rex "linkerd\s(?<linkerd_version>[^\s]+)" 

View solution in original post

0 Karma

493669
Super Champion

try this regex to extract linkerd version-

   ... |rex "linkerd\s(?<linkerd_version>[^\s]+)" 
0 Karma

moizmmz
Path Finder

Excellent! It gives me exactly what i want! Thank you so so much!!

Can you please tell me how you wrote this?

0 Karma

493669
Super Champion

Here rex command is used to extract field values
Explanation:
linkerd\s here \s indicates space so it will find word-linkerd in raw events
[^\s]+ It will check after linkerd\s until it will find any space
(?<linkerd_version> then it will store extracted value in field name linkerd_version

0 Karma

moizmmz
Path Finder

Thank you thank you thank you!!!!!!

0 Karma
Get Updates on the Splunk Community!

Cisco Catalyst Center Meets Splunk ITSI: From 'Payments Are Down' to Root Cause in ...

The Problem: When Networks and Services Don't Talk Payment systems fail at a retail location. Customers are ...

Print, Leak, Repeat: UEBA Insider Threats You Can't Ignore

Are you ready to uncover the threats hiding in plain sight? Join us for "Print, Leak, Repeat: UEBA Insider ...

New Year, New Changes for Splunk Certifications

As we embrace a new year, we’re making a small but important update to the Splunk Certification ...