Splunk Search

Help in field extraction

badari
Engager

Hello,

Sorry for a newbie question, I have the following event thats generated


{
@timestamp: 2021-06-03T17:39:34.720+00:00
@version: 1
correlation: test12345
message:{"code":200,"data":{"status":"status1234"}}
}

 

What query should I use to extract status, my requirement is when I execute my query it should come in a tabular form as follows

status status1234

Thanks in advance.

 

Labels (3)
0 Karma
1 Solution

kamlesh_vaghela
SplunkTrust
SplunkTrust

@badari 

Can you please try this?

 

YOUR_SEARCH |spath message.data.status | rename message.data.* as * | table status | transpose

 

 

My Sample Search :

 

| makeresults | eval _raw="{\"@timestamp\": \"2021-06-03T17:39:34.720+00:00\",\"@version\": \"1\", \"correlation\": \"test12345\",\"message\":{\"code\":200,\"data\":{\"status\":\"status1234\"}}}"|spath message.data.status | rename message.data.* as * | table status | transpose

 

 

Screenshot 2021-06-04 at 11.40.08 AM.png

 


 Thanks
KV
▄︻̷̿┻̿═━一

If any of my reply helps you to solve the problem Or gain knowledge, an upvote would be appreciated.

View solution in original post

isoutamo
SplunkTrust
SplunkTrust
You should use spath command
0 Karma

badari
Engager

Thanks, is it possible to give me the sample spath command that I can use? Tried searching but not getting a proper answer.

Tags (1)
0 Karma

kamlesh_vaghela
SplunkTrust
SplunkTrust

@badari 

Can you please try this?

 

YOUR_SEARCH |spath message.data.status | rename message.data.* as * | table status | transpose

 

 

My Sample Search :

 

| makeresults | eval _raw="{\"@timestamp\": \"2021-06-03T17:39:34.720+00:00\",\"@version\": \"1\", \"correlation\": \"test12345\",\"message\":{\"code\":200,\"data\":{\"status\":\"status1234\"}}}"|spath message.data.status | rename message.data.* as * | table status | transpose

 

 

Screenshot 2021-06-04 at 11.40.08 AM.png

 


 Thanks
KV
▄︻̷̿┻̿═━一

If any of my reply helps you to solve the problem Or gain knowledge, an upvote would be appreciated.

Get Updates on the Splunk Community!

Fun with Regular Expression - multiples of nine

Fun with Regular Expression - multiples of nineThis challenge was first posted on Slack #regex channel ...

[Live Demo] Watch SOC transformation in action with the reimagined Splunk Enterprise ...

Overwhelmed SOC? Splunk ES Has Your Back Tool sprawl, alert fatigue, and endless context switching are making ...

What’s New & Next in Splunk SOAR

Security teams today are dealing with more alerts, more tools, and more pressure than ever.  Join us on ...