Splunk Search

REGEX problem

splunklearner
Communicator

Please help me in extracting only compression values from this raw event - 

"response_time_last_byte":5,"compression_percentage":0,"compression":"NO_COMPRESSION_CAN_BE_COMPRESSED","client_insights":"","request_headers":577,"response_headers":13,"request_state":"AVI_HTTP_REQUEST_STATE_SEND_RESPONSE_BODY_TO_CLIENT",

"response_time_last_byte":1,"compression_percentage":0,"compression":"","client_insights":"","request_headers":3,"response_headers":12,"request_state":"AVI_HTTP_REQUEST_STATE_READ_CLIENT_REQ_HDR",

Tried this but it is extracting client insights as well. I need to exclude all compression string values by writing SEDCMD 

splunklearner_0-1739949982232.png

 

Labels (2)
0 Karma
1 Solution

livehybrid
SplunkTrust
SplunkTrust

 Hi @splunklearner 

Try using the following REGEX 

\"compression\":\"([^\"]*)\"\,

Please let me know how you get on and consider accepting this answer or adding karma this answer if it has helped.
Regards

Will

View solution in original post

livehybrid
SplunkTrust
SplunkTrust

 Hi @splunklearner 

Try using the following REGEX 

\"compression\":\"([^\"]*)\"\,

Please let me know how you get on and consider accepting this answer or adding karma this answer if it has helped.
Regards

Will

Career Survey
First 500 qualified respondents will receive a $20 gift card! Tell us about your professional Splunk journey.

Can’t make it to .conf25? Join us online!

Get Updates on the Splunk Community!

Splunkbase Unveils New App Listing Management Public Preview

Splunkbase Unveils New App Listing Management Public PreviewWe're thrilled to announce the public preview of ...

Leveraging Automated Threat Analysis Across the Splunk Ecosystem

Are you leveraging automation to its fullest potential in your threat detection strategy?Our upcoming Security ...

Can’t Make It to Boston? Stream .conf25 and Learn with Haya Husain

Boston may be buzzing this September with Splunk University and .conf25, but you don’t have to pack a bag to ...