Hi,
I Have the following event in Splunk:
Message=WriteLoadTimeToLog at offset 259 in file:line:column <filename unknown>:0:0 message: Page URL:https://dudu.dudu.com/contentshow.aspx?id=5333493&type=2 Total page load time:4.6264926s [Server side load time:0.0624926s; Client side load time:4.564s] Objects load time:[ customer:1.27s customerContact:0.165s customerFinance:0.285s customerActivities:1.089s customerToolsActivities:3.34s customerSystemActivities:4.478s customerOffersHistory:4.08s customerReceivedEmails:2.622s customerDeposits:1.635s customerWithdrawals:3.249s contactLeads:2.841s relatedCustomer:0.002s customerCrtmEvents:0s customerContactActivities:0.001s customerDemoAccounts:0s customerSentEmails:0.001s customerAssignHistory:0s customerSerialInfo:0s emailMarketing:0s ]
I'm trying to extract a new field with the Field Extractor utility, so I highlighted Total page load time:
, but I'm getting the error:
The extraction failed. If you are extracting multiple fields, try removing one or more fields. Start with extractions that are embedded within longer text strings
Can anyone help?
Thanks in advance,
Rotem
Rotem
I had answered this question before. Here's the explanation. For what you need, you can use a regex to extract the field. Try this regex Total page load time:(?[\d\.]+)
in the field extractor.
Rotem
I had answered this question before. Here's the explanation. For what you need, you can use a regex to extract the field. Try this regex Total page load time:(?[\d\.]+)
in the field extractor.