Splunk Search

How do I extract the value of a field value in Splunk?

newsplnkr
Explorer

Hello all,

I am trying to get the value of a field from an event in Splunk. The event looks like follows:

message="abtest platform=\"Target\", [testName=\"test1\",testId=\"253041,\",experience=\"lefNavigation\"]"

For the above event, how could I do a count by "testName", "testId" and "experience"? Currently, when I do count by on the message source, value for the above fields come as a backslash() .

Thanks a LOT in advance!

0 Karma

gcusello
SplunkTrust
SplunkTrust

Hi newsplnkr,
did you tried with this regex?

message\=\"abtest platform\=\\\"(?P<abtest_platform>[^\\]*)\\\",\s*\[testName\=\\\"(?P<testName>[^\\]*)\\\",testId\=\\\"(?P<testId>[^,]*),\\\",experience\=\\\"(?P<experience>[^\\]*)

you can test it at https://regex101.com/r/g5u6kU/1

Bye.
Giuseppe

0 Karma

briancronrath
Contributor

In props.conf you should specify KV_MODE = auto_escaped for a sourcetype that has values like this

0 Karma
Get Updates on the Splunk Community!

Stay Connected: Your Guide to May Tech Talks, Office Hours, and Webinars!

Take a look below to explore our upcoming Community Office Hours, Tech Talks, and Webinars this month. This ...

They're back! Join the SplunkTrust and MVP at .conf24

With our highly anticipated annual conference, .conf, comes the fez-wearers you can trust! The SplunkTrust, as ...

Enterprise Security Content Update (ESCU) | New Releases

Last month, the Splunk Threat Research Team had two releases of new security content via the Enterprise ...