Splunk Search

Help in field extraction

badari
Engager

Hello,

Sorry for a newbie question, I have the following event thats generated


{
@timestamp: 2021-06-03T17:39:34.720+00:00
@version: 1
correlation: test12345
message:{"code":200,"data":{"status":"status1234"}}
}

 

What query should I use to extract status, my requirement is when I execute my query it should come in a tabular form as follows

status status1234

Thanks in advance.

 

Labels (3)
0 Karma
1 Solution

kamlesh_vaghela
SplunkTrust
SplunkTrust

@badari 

Can you please try this?

 

YOUR_SEARCH |spath message.data.status | rename message.data.* as * | table status | transpose

 

 

My Sample Search :

 

| makeresults | eval _raw="{\"@timestamp\": \"2021-06-03T17:39:34.720+00:00\",\"@version\": \"1\", \"correlation\": \"test12345\",\"message\":{\"code\":200,\"data\":{\"status\":\"status1234\"}}}"|spath message.data.status | rename message.data.* as * | table status | transpose

 

 

Screenshot 2021-06-04 at 11.40.08 AM.png

 


 Thanks
KV
▄︻̷̿┻̿═━一

If any of my reply helps you to solve the problem Or gain knowledge, an upvote would be appreciated.

View solution in original post

isoutamo
SplunkTrust
SplunkTrust
You should use spath command
0 Karma

badari
Engager

Thanks, is it possible to give me the sample spath command that I can use? Tried searching but not getting a proper answer.

Tags (1)
0 Karma

kamlesh_vaghela
SplunkTrust
SplunkTrust

@badari 

Can you please try this?

 

YOUR_SEARCH |spath message.data.status | rename message.data.* as * | table status | transpose

 

 

My Sample Search :

 

| makeresults | eval _raw="{\"@timestamp\": \"2021-06-03T17:39:34.720+00:00\",\"@version\": \"1\", \"correlation\": \"test12345\",\"message\":{\"code\":200,\"data\":{\"status\":\"status1234\"}}}"|spath message.data.status | rename message.data.* as * | table status | transpose

 

 

Screenshot 2021-06-04 at 11.40.08 AM.png

 


 Thanks
KV
▄︻̷̿┻̿═━一

If any of my reply helps you to solve the problem Or gain knowledge, an upvote would be appreciated.

Career Survey
First 500 qualified respondents will receive a $20 gift card! Tell us about your professional Splunk journey.

Can’t make it to .conf25? Join us online!

Get Updates on the Splunk Community!

Community Content Calendar, September edition

Welcome to another insightful post from our Community Content Calendar! We're thrilled to continue bringing ...

Splunkbase Unveils New App Listing Management Public Preview

Splunkbase Unveils New App Listing Management Public PreviewWe're thrilled to announce the public preview of ...

Leveraging Automated Threat Analysis Across the Splunk Ecosystem

Are you leveraging automation to its fullest potential in your threat detection strategy?Our upcoming Security ...