Splunk Search

Extract field value

vintik
Engager

Hello,

Could anybody assist with this question - what method is the best to extract to new field value of "animal" key? Should I use eval or searchmatch or something else?

Here is example:

[some_date] ..."application":"some_app", "animal":"dog","segment":....
[some_date] ..."application":"some_app", "animal":"cat","segment":....

I need this variable to use in stats.

Tags (2)
0 Karma
1 Solution

FrankVl
Ultra Champion

This should work:
| rex "\"animal\":\"(?<animal>[^\"]+)\""

Alternatively, you could try the following to apply key value extractions on your events. Whether this works properly depends on what exactly your full data looks like, but might be worth playing around with.
| extract pairdelim=",", kvdelim=":"

View solution in original post

althomas
Communicator

If it's json, use spath

Otherwise you can do something like this:

transforms.conf:

[my_kv_transform]
FORMAT = $1::$2
REGEX = \"([^"]+)\":\"([^"]+)\"

props.conf

[my_sourcetype]
REPORT-my_sourcetype_kv = my_kv_transform

This should do search-time extractions to get animal=dog and application=someapp

0 Karma

FrankVl
Ultra Champion

This should work:
| rex "\"animal\":\"(?<animal>[^\"]+)\""

Alternatively, you could try the following to apply key value extractions on your events. Whether this works properly depends on what exactly your full data looks like, but might be worth playing around with.
| extract pairdelim=",", kvdelim=":"

Get Updates on the Splunk Community!

Application management with Targeted Application Install for Victoria Experience

  Experience a new era of flexibility in managing your Splunk Cloud Platform apps! With Targeted Application ...

Index This | What goes up and never comes down?

January 2026 Edition  Hayyy Splunk Education Enthusiasts and the Eternally Curious!   We’re back with this ...

Splunkers, Pack Your Bags: Why Cisco Live EMEA is Your Next Big Destination

The Power of Two: Splunk &#43; Cisco at "Ludicrous Scale"   You know Splunk. You know Cisco. But have you seen ...