Getting Data In

How do you Filter events from Json?

ppanchal
Path Finder

Below is my JSON. I want to display all events where responseTime >11.

Please assist.

log:    {   [-] 
         actionCd:   Update 
         appSourceCd:    MAS    
         appTargetCd:    OCS    
         contextID:  daa095c0-6e9b-1abf-970a-fffffc8664b7   
         correlateID:    1149623816 
         customUID:  05248008   
         interfaceName:  wm_businessservices.customerService.flowServices:publishSvcReqEvents   
         requestTypeCd:  SvcReq2    
         responseTime:   9  

Vijeta
Influencer

If you use sourcetype as pre-defined for json in splunk it should be auto extracted. Else you will have to create field extractions or regex.

0 Karma

alonsocaio
Contributor

You can try to extract new fields for this events, in this case, you will need to extract the responseTime field.

It is possible to extract new fields using regex or delimiters, and you can access the extraction field menu by clicking in Event Actions -> Extract Fields, in the result of your search.

If it works, you will be able to filter your search using the new extracted field.

0 Karma

alonsocaio
Contributor

Have you tried to extract the fields you need to your search?

0 Karma
Get Updates on the Splunk Community!

Introducing the Splunk Community Dashboard Challenge!

Welcome to Splunk Community Dashboard Challenge! This is your chance to showcase your skills in creating ...

Wondering How to Build Resiliency in the Cloud?

IT leaders are choosing Splunk Cloud as an ideal cloud transformation platform to drive business resilience,  ...

Updated Data Management and AWS GDI Inventory in Splunk Observability

We’re making some changes to Data Management and Infrastructure Inventory for AWS. The Data Management page, ...