Splunk Search

Help in field extraction

badari
Engager

Hello,

Sorry for a newbie question, I have the following event thats generated


{
@timestamp: 2021-06-03T17:39:34.720+00:00
@version: 1
correlation: test12345
message:{"code":200,"data":{"status":"status1234"}}
}

 

What query should I use to extract status, my requirement is when I execute my query it should come in a tabular form as follows

status status1234

Thanks in advance.

 

Labels (3)
0 Karma
1 Solution

kamlesh_vaghela
SplunkTrust
SplunkTrust

@badari 

Can you please try this?

 

YOUR_SEARCH |spath message.data.status | rename message.data.* as * | table status | transpose

 

 

My Sample Search :

 

| makeresults | eval _raw="{\"@timestamp\": \"2021-06-03T17:39:34.720+00:00\",\"@version\": \"1\", \"correlation\": \"test12345\",\"message\":{\"code\":200,\"data\":{\"status\":\"status1234\"}}}"|spath message.data.status | rename message.data.* as * | table status | transpose

 

 

Screenshot 2021-06-04 at 11.40.08 AM.png

 


 Thanks
KV
▄︻̷̿┻̿═━一

If any of my reply helps you to solve the problem Or gain knowledge, an upvote would be appreciated.

View solution in original post

isoutamo
SplunkTrust
SplunkTrust
You should use spath command
0 Karma

badari
Engager

Thanks, is it possible to give me the sample spath command that I can use? Tried searching but not getting a proper answer.

Tags (1)
0 Karma

kamlesh_vaghela
SplunkTrust
SplunkTrust

@badari 

Can you please try this?

 

YOUR_SEARCH |spath message.data.status | rename message.data.* as * | table status | transpose

 

 

My Sample Search :

 

| makeresults | eval _raw="{\"@timestamp\": \"2021-06-03T17:39:34.720+00:00\",\"@version\": \"1\", \"correlation\": \"test12345\",\"message\":{\"code\":200,\"data\":{\"status\":\"status1234\"}}}"|spath message.data.status | rename message.data.* as * | table status | transpose

 

 

Screenshot 2021-06-04 at 11.40.08 AM.png

 


 Thanks
KV
▄︻̷̿┻̿═━一

If any of my reply helps you to solve the problem Or gain knowledge, an upvote would be appreciated.

Get Updates on the Splunk Community!

Enhance Security Visibility with Splunk Enterprise Security 7.1 through Threat ...

(view in My Videos)Struggling with alert fatigue, lack of context, and prioritization around security ...

Troubleshooting the OpenTelemetry Collector

  In this tech talk, you’ll learn how to troubleshoot the OpenTelemetry collector - from checking the ...

Adoption of Infrastructure Monitoring at Splunk

  Splunk's Growth Engineering team showcases one of their first Splunk product adoption-Splunk Infrastructure ...