Splunk Search

how to extract fields from json format event?

nehamvinchankar
Path Finder

Hi all, i want to extract fields from event which is in json format

INFO [processor: anchsdgeiskgcbc/5; event: 1-57d28402-9058-11ee-83b7-021a6f9d1f1c] : DETAILS: [
{
"ERROR_MESSAGE": "\nError: abchdvshsuaajs.\n",
"NUMBER": "123r57",
"DB_TIMESTAMP": "2023-11-30"
},
{
"ERROR_MESSAGE": "\nError: ehwegagsuabajehss.\n",
"NUMBER": "63638w82u",
"DB_TIMESTAMP": "2023-11-30"
},

and similarly we have these error data in one event

Fields to be extracted -
ERROR_MESSAGE
NUMBER
DB_TIMESTAMP




Labels (1)
0 Karma

ITWhisperer
SplunkTrust
SplunkTrust

Given that this doesn't appear to be wholly correct JSON, you could start with something like this

| rex "DETAILS: (?<details>\[.*\])"
| spath input=details 
0 Karma

nehamvinchankar
Path Finder

no this is not working

 

0 Karma

ITWhisperer
SplunkTrust
SplunkTrust

What results do you get then?

0 Karma

nehamvinchankar
Path Finder

nehamvinchankar_0-1701833361480.png

details field is blank

0 Karma

ITWhisperer
SplunkTrust
SplunkTrust

Try this

| rex "(?ms)DETAILS: (?<details>\[.*\])"
| spath input=details 
0 Karma
Get Updates on the Splunk Community!

Enterprise Security Content Update (ESCU) | New Releases

In December, the Splunk Threat Research Team had 1 release of new security content via the Enterprise Security ...

Why am I not seeing the finding in Splunk Enterprise Security Analyst Queue?

(This is the first of a series of 2 blogs). Splunk Enterprise Security is a fantastic tool that offers robust ...

Index This | What are the 12 Days of Splunk-mas?

December 2024 Edition Hayyy Splunk Education Enthusiasts and the Eternally Curious!  We’re back with another ...