Splunk search events returns json format log data. I want to remove a particular key:value pair since the value of this key is huge (in terms of length) and unnecessary. How can I do so. sample log data: { "abcd1": "asd", "abcd2": [], "abcd3": true, "toBeRemoved": [{ "abcd8": 234, "abcd9": [{ "abcd10": "asd234" }], "abcd11": "asdasd" }], "abcd4": 324.234, "abcd5": "dfsad dfsdf", "abcd6": 0, "abcd7": "asfsdf" } The key:value pair to be removed has been marked in bold. ! NOTE THIS IS FORMATTED DATA, FIELDS CAN HAVE STRINGS, NUMBERS, BOTH, LISTS, ETC !
... View more