Splunk Search

Regex help

SS1
Path Finder

Hi,

Can someone help with the regex for below log entry, i need regex to extract the below fields in red. Thanks for your help

INFO 1 --- [nio-8080-exec-2] XXXXXXXXXXX.SLALogging : Response --> {
"TestDetails" : [ {
"TestIdentifiers" : {
"TestIdentifier" : "xxxx",
"TestBusiness" : 1
},
"borrower" : {
"lastName" : "XXXXXX",
"firstName" : "XXXXXX",
"middleName" : "XX"
},
"propertyAddress" : {
"street1" : "XXXXXXXXX",
"city" : "XXXXXX",
"state" : "XX",
"zip" : "XXXXXX",
"country" : "XX"
},
"TestLoanNumber" : "XXXXXXXXXX"
"TestIdentifiers" : {
"TestIdentifier" : "xxxx",
"TestBusiness" : 1

Labels (5)
0 Karma
1 Solution

ITWhisperer
SplunkTrust
SplunkTrust
| rex "(?ms)\"borrower\"\s?:\s?\{(?<borrower>[^\}]+)\}.*\"propertyAddress\"\s?:\s?\{(?<propertyAddress>[^\}]+)\}"

View solution in original post

0 Karma

SS1
Path Finder

Thanks, this worked perfectly

0 Karma

ITWhisperer
SplunkTrust
SplunkTrust
| rex "(?ms)\"borrower\"\s?:\s?\{(?<borrower>[^\}]+)\}.*\"propertyAddress\"\s?:\s?\{(?<propertyAddress>[^\}]+)\}"
0 Karma
Get Updates on the Splunk Community!

Application management with Targeted Application Install for Victoria Experience

  Experience a new era of flexibility in managing your Splunk Cloud Platform apps! With Targeted Application ...

Index This | What goes up and never comes down?

January 2026 Edition  Hayyy Splunk Education Enthusiasts and the Eternally Curious!   We’re back with this ...

Splunkers, Pack Your Bags: Why Cisco Live EMEA is Your Next Big Destination

The Power of Two: Splunk &#43; Cisco at "Ludicrous Scale"   You know Splunk. You know Cisco. But have you seen ...