Splunk Dev

how to extract only one filed from events out of possible duplicates

VI371887
Path Finder

Hi I have event logs where

rex under field extraction, to extract each value following a string and stopping at first coma, and avoid duplicates

example :
hcyycuvubuv : 45544.466, "disk_byte" :23.45667, "disk_byte_quota": 23.345t,

in above string, I am only looking for numbers that come after "disk_byte" :
, which is 23.45667

problem is, in my events the disk_bytes string is not at the same location in logs and there's disk_bytes_quota which should be ignored.

example :

first event
chhchvhvh: 223. 455, "disk_byte" :23.45667,"disk_byte_quota": 23.345t,
gghffvhh:3455

second event
chhchvhvh: 223. 455, tuvjvujjvg:3456.566, "cpu_percentage":23.45677,gghffvhh:3455.788,"disk_byte" :23.45667, "disk_byte_quota": 23.345t,

Tags (1)
0 Karma
1 Solution

richgalloway
SplunkTrust
SplunkTrust

The regex string "disk_byte"\s:(?[\d.]+)" will extract the "disk_byte" field and ignore the "disk_bytes_quota" field.

---
If this reply helps you, Karma would be appreciated.

View solution in original post

richgalloway
SplunkTrust
SplunkTrust

The regex string "disk_byte"\s:(?[\d.]+)" will extract the "disk_byte" field and ignore the "disk_bytes_quota" field.

---
If this reply helps you, Karma would be appreciated.

VI371887
Path Finder

hi i am having similar issues,

with msg field

it's has different values can be numbers, strings, path, punctuations, blank space like shown below.

"msg" :"35556"
"msg" :"<<÷] {<} ;;"
"msg" :"ycuvuuu jvbigg buivuv"
"msg" :" "

now problem is, i have written rex as
\msg\":(? \". *\") \,

but it returns value which following msg field.

"msg" :"vjvuv igivc uvviv", "origin" :"abcgc", "time" :23.45677",

0 Karma
Get Updates on the Splunk Community!

Splunk Observability for AI

Don’t miss out on an exciting Tech Talk on Splunk Observability for AI!Discover how Splunk’s agentic AI ...

Splunk Enterprise Security 8.x: The Essential Upgrade for Threat Detection, ...

Watch On Demand the Tech Talk, and empower your SOC to reach new heights! Duration: 1 hour  Prepare to ...

Splunk Observability as Code: From Zero to Dashboard

For the details on what Self-Service Observability and Observability as Code is, we have some awesome content ...