Splunk Search

How to format event in search

gentcore
New Member

Hi,

I am running a search and the event structure is displaying as:

{ [-]
   line: 2019-09-27 11:47:29,696 [server] INFO  [http-nio-8079-exec-1] [] [] o.s.w.s.DispatcherServlet | Completed initialization in 7 ms
   source: stdout
   tag: 1445465d0f2e
}

Is there any way i can just have the event display as:

2019-09-27 11:47:29,696 [server] INFO  [http-nio-8079-exec-1] [] [] o.s.w.s.DispatcherServlet | Completed initialization in 7 ms

i.e. I am only interested in displaying the "line" data, to make it easier to read through the logs

Cheers.

0 Karma

gcusello
SplunkTrust
SplunkTrust

Hi gentcore,
do you want to display or to index the event in this way ?
if you want to display the event in this way, you can use a regex like this:

your_search
| rex "\{\s+\[-\]\s*line:\s+(?<my_log>[^\}]*)"
| table _time my_log

If instead you want to index only this part of event and discard the rest, you have to insert in your props.conf, in the stanza of this sourcetype:

SEDCMD-my_log = s/\{\s+\[-\]\s*line:\s+//g

You can test the regex at https://regex101.com/r/AZsiou/1 .

Bye.
Giuseppe

Get Updates on the Splunk Community!

Data Management Digest – December 2025

Welcome to the December edition of Data Management Digest! As we continue our journey of data innovation, the ...

Index This | What is broken 80% of the time by February?

December 2025 Edition   Hayyy Splunk Education Enthusiasts and the Eternally Curious!    We’re back with this ...

Unlock Faster Time-to-Value on Edge and Ingest Processor with New SPL2 Pipeline ...

Hello Splunk Community,   We're thrilled to share an exciting update that will help you manage your data more ...