Splunk Search

How to parse Event to get 3rd item and pieces of 3rd item?

trent6
Explorer

I have a collection of log files that I am trying to parse. 
Quick summary:
From Apache/Tomcat using logback

I don't have permission to change the layout of the log files at the moment but can work on that

Event field from the quick parse seems to hold a lot of data that could be separated out into "Fields" via comma separation.  

I seem to need the 3rd item in Event if we could parse them by comma

Is there an easy way to do that in the query syntax?

The Event section looks like:
date,  something about a filter, THE URL THAT I WANT, other junk etc

2022-05-01 23:15:24,  calling SSO: null, /topUrl/rest/services/folder/servicename/command?moreinfoEtc, referer: Null, request ip: 10.xxx.xxx.xxx

So, I'd love to get statistics on 

topURL

ServiceName

Any help would be great.

 

Labels (1)
0 Karma

trent6
Explorer

Actually, as I look at the files, they are all CSV.  and the item that I want is th 3rd or 4th item.
How do i Splunk Free to just read the filess as csv and treat them as columns?  This should be very simple.
Take a months worth of web logs and parse them in to fields based on CSV and allow me to do some basic queries....
How do I read them in as simple csv?

0 Karma
Get Updates on the Splunk Community!

[Puzzles] Solve, Learn, Repeat: Dynamic formatting from XML events

This challenge was first posted on Slack #puzzles channelFor a previous puzzle, I needed a set of fixed-length ...

Enter the Agentic Era with Splunk AI Assistant for SPL 1.4

  🚀 Your data just got a serious AI upgrade — are you ready? Say hello to the Agentic Era with the ...

Stronger Security with Federated Search for S3, GCP SQL & Australian Threat ...

Splunk Lantern is a Splunk customer success center that provides advice from Splunk experts on valuable data ...