Splunk Search

How to parse Event to get 3rd item and pieces of 3rd item?


I have a collection of log files that I am trying to parse. 
Quick summary:
From Apache/Tomcat using logback

I don't have permission to change the layout of the log files at the moment but can work on that

Event field from the quick parse seems to hold a lot of data that could be separated out into "Fields" via comma separation.  

I seem to need the 3rd item in Event if we could parse them by comma

Is there an easy way to do that in the query syntax?

The Event section looks like:
date,  something about a filter, THE URL THAT I WANT, other junk etc

2022-05-01 23:15:24,  calling SSO: null, /topUrl/rest/services/folder/servicename/command?moreinfoEtc, referer: Null, request ip: 10.xxx.xxx.xxx

So, I'd love to get statistics on 



Any help would be great.


Labels (1)
0 Karma


Actually, as I look at the files, they are all CSV.  and the item that I want is th 3rd or 4th item.
How do i Splunk Free to just read the filess as csv and treat them as columns?  This should be very simple.
Take a months worth of web logs and parse them in to fields based on CSV and allow me to do some basic queries....
How do I read them in as simple csv?

0 Karma
Get Updates on the Splunk Community!

Dashboard Studio Challenge - Learn New Tricks, Showcase Your Skills, and Win Prizes!

Reimagine what you can do with your dashboards. Dashboard Studio is Splunk’s newest dashboard builder to ...

Introducing Edge Processor: Next Gen Data Transformation

We get it - not only can it take a lot of time, money and resources to get data into Splunk, but it also takes ...

Take the 2021 Splunk Career Survey for $50 in Amazon Cash

Help us learn about how Splunk has impacted your career by taking the 2021 Splunk Career Survey. Last year’s ...