Splunk Search

How to extract value using KV pairs?

hraj05579
New Member

Hello all,

How I can extra value from my event?

23-Oct-2019 08:07:23 <TestCase1>23</TestCase1>
23-Oct-2019 08:07:23    <TestCasePassed>234</TestCasePassed>

I want to display TestCase1= 23 TestCasePassed=234

Thanks in advance.

0 Karma

woodcock
Esteemed Legend

Like this:

|makeresults | eval raw=" 23-Oct-2019 08:07:23 <TestCase1>23</TestCase1>:::23-Oct-2019 08:07:23 <TestCasePassed>234</TestCasePassed>"
| makemv delim=":::" raw
| mvexpand raw
| rename raw AS _raw

| rename COMMENT AS "Everything above generates sample event data; everything below is your solution."

| rex max_match=20 "<(?<key>[^\/][^>]+)>(?<value>.*?)<\/[^>]+>"
| eval _raw=mvzip(key, value, "=")
| kv
0 Karma

to4kawa
Ultra Champion
| makeresults
| eval raw="23-Oct-2019 08:07:23 <TestCase1>23</TestCase1>
23-Oct-2019 08:07:23    <TestCasePassed>234</TestCasePassed>"
| makemv delim="
" raw
| mvexpand raw
| rex field=raw "(?<time>^[^ ]+ [^ ]+) (?<_raw>.+)"
| eval _time=strptime(time,"%d-%b-%Y %H:%M:%S")
| table _time _raw
`comment("this is sample data")`
| spath

Hi, try spath command

0 Karma
Get Updates on the Splunk Community!

Stay Connected: Your Guide to November Tech Talks, Office Hours, and Webinars!

&#x1f342; Fall into November with a fresh lineup of Community Office Hours, Tech Talks, and Webinars we’ve ...

Transform your security operations with Splunk Enterprise Security

Hi Splunk Community, Splunk Platform has set a great foundation for your security operations. With the ...

Splunk Admins and App Developers | Earn a $35 gift card!

Splunk, in collaboration with ESG (Enterprise Strategy Group) by TechTarget, is excited to announce a ...