Splunk Search

parse and index json fields from string message

vashodha
Loves-to-Learn Lots

Hello,

I have log in the format 

"2021-02-18T16:17:12,189Z [main] INFO logname -streamstart-k1:V1,K2:V2,K3:V3,streamstop, <ADDIITONAL DATA>"  i want to parse out json elements k1:v1 etc thats between  "-streamstart" and streamstop

Labels (1)
0 Karma

b4badri
New Member

Try this

rex "streamstart(?<myvariable>(.*)(?=streamstop))"

 

0 Karma

vashodha
Loves-to-Learn Lots

it does the job but still dosent index the fields its extracted it out to the variable  can we somehow index these csv values

0 Karma

vashodha
Loves-to-Learn Lots

This gives me what i want but i am unable to index it in splunk 

(?<=streamstart-).*?(?=streamstop)

0 Karma

b4badri
New Member

Hi @vashodha 

Yes. Data extracted using rex in the search time will only be available for the search. You need to follow series of steps based on your Splunk solution for creating fields at Index time.

Please refer the below article.

Create custom fields at index time - Splunk Documentation

0 Karma
Got questions? Get answers!

Join the Splunk Community Slack to learn, troubleshoot, and make connections with fellow Splunk practitioners in real time!

Meet up IRL or virtually!

Join Splunk User Groups to connect and learn in-person by region or remotely by topic or industry.

Get Updates on the Splunk Community!

Why Splunk Customers Should Attend Cisco Live 2026 Las Vegas

Why Splunk Customers Should Attend Cisco Live 2026 Las Vegas     Cisco Live 2026 is almost here, and this ...

What Is the Name of the USB Key Inserted by Bob Smith? (BOTS Hint, Not the Answer)

Hello Splunkers,   So you searched, “what is the name of the usb key inserted by bob smith?”  Not gonna lie… ...

Automating Threat Operations and Threat Hunting with Recorded Future

    Automating Threat Operations and Threat Hunting with Recorded Future June 29, 2026 | Register   Is your ...