Splunk Search

How to extract a field with special characters?

mugilbala
Engager

Hi,

I have a log statement that prints service execution time like -

Service Response : {"entity":"{\"transactionId\":\"39182d7a-7f34-4c28-a0f2-9b42b9b206df\",\"executionTimeInMillis\":112,"status":201}

I am trying to extract the value of "executionTimeInMillis".

My search statement - index="xyz" "Service Response :" | search "\"executionTimeInMillis\"\":"(?exeTime[^\$]*)," | table _time, exeTime
Note: I have added <> to exeTime. It is not showing in the question.

However, it did not show any results. Can you help me with this query?

0 Karma
1 Solution

somesoni2
Revered Legend

The field extraction command is rex, not search. There may be few issues with your regex, e.g. there is no double quotes after colon. So try this

index="xyz" "Service Response :" | rex "\"executionTimeInMillis[^\:]+\:\s*(?<exeTime>[^,]+)" | table _time, exeTime

View solution in original post

0 Karma

somesoni2
Revered Legend

The field extraction command is rex, not search. There may be few issues with your regex, e.g. there is no double quotes after colon. So try this

index="xyz" "Service Response :" | rex "\"executionTimeInMillis[^\:]+\:\s*(?<exeTime>[^,]+)" | table _time, exeTime
0 Karma

mugilbala
Engager

Thank you so much. It worked. Appreciate your help.

0 Karma
Get Updates on the Splunk Community!

Automatic Discovery Part 1: What is Automatic Discovery in Splunk Observability Cloud ...

If you’ve ever deployed a new database cluster, spun up a caching layer, or added a load balancer, you know it ...

Real-Time Fraud Detection: How Splunk Dashboards Protect Financial Institutions

Financial fraud isn't slowing down. If anything, it's getting more sophisticated. Account takeovers, credit ...

Splunk + ThousandEyes: Correlate frontend, app, and network data to troubleshoot ...

 Are you tired of troubleshooting delays caused by siloed frontend, application, and network data? We've got a ...