Splunk Search

parse and index json fields from string message

vashodha
Loves-to-Learn Lots

Hello,

I have log in the format 

"2021-02-18T16:17:12,189Z [main] INFO logname -streamstart-k1:V1,K2:V2,K3:V3,streamstop, <ADDIITONAL DATA>"  i want to parse out json elements k1:v1 etc thats between  "-streamstart" and streamstop

Labels (1)
0 Karma

b4badri
New Member

Try this

rex "streamstart(?<myvariable>(.*)(?=streamstop))"

 

0 Karma

vashodha
Loves-to-Learn Lots

it does the job but still dosent index the fields its extracted it out to the variable  can we somehow index these csv values

0 Karma

vashodha
Loves-to-Learn Lots

This gives me what i want but i am unable to index it in splunk 

(?<=streamstart-).*?(?=streamstop)

0 Karma

b4badri
New Member

Hi @vashodha 

Yes. Data extracted using rex in the search time will only be available for the search. You need to follow series of steps based on your Splunk solution for creating fields at Index time.

Please refer the below article.

Create custom fields at index time - Splunk Documentation

0 Karma
Get Updates on the Splunk Community!

Finding Based Detections General Availability

Overview  We’ve come a long way, folks, but here in Enterprise Security 8.4 I’m happy to announce Finding ...

Get Your Hands Dirty (and Your Shoes Comfy): The Splunk Experience

Hands-On Learning and Technical Seminars  Sometimes, you just need to see the code. For those looking for a ...

What’s New in Splunk Observability Cloud: January Feature Highlights & Deep Dives

Splunk Observability Cloud continues to evolve, empowering engineering and operations teams with advanced ...