Splunk Search

Extract field value

vintik
Engager

Hello,

Could anybody assist with this question - what method is the best to extract to new field value of "animal" key? Should I use eval or searchmatch or something else?

Here is example:

[some_date] ..."application":"some_app", "animal":"dog","segment":....
[some_date] ..."application":"some_app", "animal":"cat","segment":....

I need this variable to use in stats.

Tags (2)
0 Karma
1 Solution

FrankVl
Ultra Champion

This should work:
| rex "\"animal\":\"(?<animal>[^\"]+)\""

Alternatively, you could try the following to apply key value extractions on your events. Whether this works properly depends on what exactly your full data looks like, but might be worth playing around with.
| extract pairdelim=",", kvdelim=":"

View solution in original post

althomas
Communicator

If it's json, use spath

Otherwise you can do something like this:

transforms.conf:

[my_kv_transform]
FORMAT = $1::$2
REGEX = \"([^"]+)\":\"([^"]+)\"

props.conf

[my_sourcetype]
REPORT-my_sourcetype_kv = my_kv_transform

This should do search-time extractions to get animal=dog and application=someapp

0 Karma

FrankVl
Ultra Champion

This should work:
| rex "\"animal\":\"(?<animal>[^\"]+)\""

Alternatively, you could try the following to apply key value extractions on your events. Whether this works properly depends on what exactly your full data looks like, but might be worth playing around with.
| extract pairdelim=",", kvdelim=":"

Get Updates on the Splunk Community!

AI for AppInspect

We’re excited to announce two new updates to AppInspect designed to save you time and make the app approval ...

App Platform's 2025 Year in Review: A Year of Innovation, Growth, and Community

As we step into 2026, it’s the perfect moment to reflect on what an extraordinary year 2025 was for the Splunk ...

Operationalizing Entity Risk Score with Enterprise Security 8.3+

Overview Enterprise Security 8.3 introduces a powerful new feature called “Entity Risk Scoring” (ERS) for ...