Splunk Search

How to extract values?

valpravin
Engager

My Log Contains

"SeqNo":4433221,"T_CODE":"ABC","VALUE":983123456,"VALUE2":"0000000000",

I am in need of VALUE field which will display 983123456 as an output tried with this query

|rex VALUE="(?[^\d*])" |table VALUE

please help

Tags (1)
0 Karma

woodcock
Esteemed Legend

Like this:

| makeresults 
| eval _raw= "\"SeqNo\":4433221,\"T_CODE\":\"ABC\",\"VALUE\":983123456,\"VALUE2\":\"0000000000\","

| rename COMMENT AS "Everything above generates sample event data; everything below is your solution."

| rex max_match=0 "(?<KEY_1>[^:\"]+)\"?:\"?(?<VAL_1>[^:\"]+)\"?,"
| eval _raw = mvzip(KEY_1, VAL_1, "=")
| kv

I named them this way for a reason; search for _KEY_1 on this page:
https://docs.splunk.com/Documentation/Splunk/latest/Data/Configureindex-timefieldextraction

0 Karma

vnravikumar
Champion

Hi

Check this

| makeresults 
| eval temp= "\"SeqNo\":4433221,\"T_CODE\":\"ABC\",\"VALUE\":983123456,\"VALUE2\":\"0000000000\", "
|rex field=temp "VALUE\"\:(?P<value>\d+)"
0 Karma
Get Updates on the Splunk Community!

Aligning Observability Costs with Business Value: Practical Strategies

 Join us for an engaging Tech Talk on Aligning Observability Costs with Business Value: Practical ...

Mastering Data Pipelines: Unlocking Value with Splunk

 In today's AI-driven world, organizations must balance the challenges of managing the explosion of data with ...

Splunk Up Your Game: Why It's Time to Embrace Python 3.9+ and OpenSSL 3.0

Did you know that for Splunk Enterprise 9.4, Python 3.9 is the default interpreter? This shift is not just a ...