Splunk Search

How to extract a list of quoted key value pairs when some values have spaces?

prcough
New Member

Hello,

I am attempting to figure out how to extract the following example event for all fields (the real event has ~30 fields but these show all use cases).

{'start_time': '2019-07-30 15:19:20', 'duration': '2', 'ip': '192.168.1.1', 'mac': '00:00:00:00:00:00', 'source': 'open source'}

I started my attempts with delimiters I found through some googling,

transforms.conf
[my_sourcetype]
DELIMS = "\"{,}", ": "

With this in place the event would have duration and IP extracted, but not mac, source, or start_time.

Any help is appreciated.

0 Karma
1 Solution

jnudell_2
Builder

Hi @prcough ,

You're missing the command to allow multiple values:


transforms.conf
[my_sourcetype]
DELIMS = "\"{,}", ": "
MV_ADD = true

You could also try:


[my_sourcetype]
REGEX = '([^']+)': '([^']+)'
FORMAT = $1::$2
MV_ADD = true

View solution in original post

0 Karma

jnudell_2
Builder

Hi @prcough ,

You're missing the command to allow multiple values:


transforms.conf
[my_sourcetype]
DELIMS = "\"{,}", ": "
MV_ADD = true

You could also try:


[my_sourcetype]
REGEX = '([^']+)': '([^']+)'
FORMAT = $1::$2
MV_ADD = true

0 Karma
Get Updates on the Splunk Community!

Observability Unlocked: Kubernetes Monitoring with Splunk Observability Cloud

  Ready to master Kubernetes and cloud monitoring like the pros?Join Splunk’s Growth Engineering team for an ...

Wrapping Up Cybersecurity Awareness Month

October might be wrapping up, but for Splunk Education, cybersecurity awareness never goes out of season. ...

🌟 From Audit Chaos to Clarity: Welcoming Audit Trail v2

🗣 You Spoke, We Listened  Audit Trail v2 wasn’t written in isolation—it was shaped by your voices.  In ...