hi all,
I am trying to extract field from Splunk "extract more fields" feature, its not showing as the logs in events section, which is in json format.
below is the sample log from which I need to extract or regex from field "id"="+779988663344" and "id" = 333222268888 numbers.
"Session-IngresslId": "999999999-9999999-999999999@SSS.com", "EgressId": "999999999-9999999-999999999@b.com", "Accc-ll-Id": "", "Generic-Id": "", "Id": "+779988663344\" ;tag=7777777777-4444444444\"", "Id": "333222268888\" \""
all events are in json format but when we are using field extractor I see all above kind of raw events.
thanks for helping
... View more