Knowledge Management

How to extract data?

vineela
Path Finder

i need to extract one field whichis not having as field value pair and i have to distinguish the logs based on that particular field.

Here is the example log:
{"log":"[10:30:04.075] [INFO ] [] [c.c.n.b.i.DefaultBusinessEventService] [akka://MmsAuCluster/system/sharding/notificationAuthBpmn/4/nmT9K3rySjyoHHzxO9jHnQ_4/nmT9K3rySjyoHHzxO9jHnQ] - method=prepare; triggerName=approvalStart, entity={'id'='0f86c9007ff511ed82ffd13c4d1f79a9a07ff511ed82ffd13c4d173b0a','eventCode'='approval','paymentSystemId'='MMS','servicingAgentBIC'='null','messageIdentification'='0f86ff511ed82ffd13c4d173b0a','businessDomainName'='Mandate','catalogCode'='AN','functionCode'='APAL_INTERACTION'}

Above log is the example here i have extracted other fields in log which has field value pairs like triggername,eventcode and all.

But i need to filter log for "c.c.n.b.i.DefaultBusinessEventService" and info logs.
Can anyone help me out ..how to filter logs based on above information.

thanks in advance

Labels (1)
Tags (1)
0 Karma
1 Solution

gcusello
SplunkTrust
SplunkTrust

Hi @vineela,

this seems to be a json log so you can use the spath command (https://docs.splunk.com/Documentation/Splunk/latest/SearchReference/Spath), otherwise you can use this regex:

| rex "^[^\[]+\[[^\]]+\]\s+\[(?<log_level>[^\]]+)\]\s+\[[^\]]*\]\s+(?<your_field>[^\]]+)"

That you can test at https://regex101.com/r/xkkVfi/1

Ciao.

Giuseppe

View solution in original post

0 Karma

gcusello
SplunkTrust
SplunkTrust

Hi @vineela,

this seems to be a json log so you can use the spath command (https://docs.splunk.com/Documentation/Splunk/latest/SearchReference/Spath), otherwise you can use this regex:

| rex "^[^\[]+\[[^\]]+\]\s+\[(?<log_level>[^\]]+)\]\s+\[[^\]]*\]\s+(?<your_field>[^\]]+)"

That you can test at https://regex101.com/r/xkkVfi/1

Ciao.

Giuseppe

0 Karma

vineela
Path Finder

Thanks for your reply gcusello...That works great splunk champ

0 Karma

gcusello
SplunkTrust
SplunkTrust

Hi @vineela,

good for you, see next time!

Ciao and happy splunking

Giuseppe

P.S.: Karma Points are appreciated 😉

Career Survey
First 500 qualified respondents will receive a $20 gift card! Tell us about your professional Splunk journey.
Get Updates on the Splunk Community!

Tech Talk Recap | Mastering Threat Hunting

Mastering Threat HuntingDive into the world of threat hunting, exploring the key differences between ...

Observability for AI Applications: Troubleshooting Latency

If you’re working with proprietary company data, you’re probably going to have a locally hosted LLM or many ...

Splunk AI Assistant for SPL vs. ChatGPT: Which One is Better?

In the age of AI, every tool promises to make our lives easier. From summarizing content to writing code, ...