Splunk Search

Extract a substring and filter the results based on the extracted substring from incoming logs

nagar57
Communicator

I am pretty new to Splunk and finding a way to figure out below:
My incoming logs have a field message which contains String formatted value. e.g.

message="OVERALL_RESPONSE_TIME=43ms"
message="Correlation_id=123123hewgadkksksk"

Now I want to filter out messages which don't contain OVERALL_RESPONSE_TIME as a String and also extract OVERALL_RESPONSE_TIME as a field. I am looking for a single Eval expression to do so.

TIA

0 Karma

richgalloway
SplunkTrust
SplunkTrust

I'm not sure one can do that with a single eval. Try this query. The regex command filters out events that don't contain OVERALL_RESPONSE_TIME and the rex command extracts OVERALL_RESPONSE_TIME as a field.

... | regex message!="OVERALL_RESPONSE_TIME=\d+ms" | rex field=message "OVERALL_RESPONSE_TIME=(?<responseTime>\d+)" | ...
---
If this reply helps you, Karma would be appreciated.
0 Karma
Get Updates on the Splunk Community!

Splunk Observability Cloud’s AI Assistant in Action Series: Analyzing and ...

This is the second post in our Splunk Observability Cloud’s AI Assistant in Action series, in which we look at ...

Elevate Your Organization with Splunk’s Next Platform Evolution

 Thursday, July 10, 2025  |  11AM PDT / 2PM EDT Whether you're managing complex deployments or looking to ...

Splunk Answers Content Calendar, June Edition

Get ready for this week’s post dedicated to Splunk Dashboards! We're celebrating the power of community by ...