Splunk Dev

Extract selected fields from .txt

vickram
New Member

Hi All,
I Need to extract " CURDEPTH(553)" and "MAXDEPTH(15000)" as two seperate fields from the below .txt file (below is the sample stanza). Can you please help.

Thanks in advance.

1 : dis ql('PAPL.ESB.FDS.DELIVERYCONSTRUCT.QUEUE.ESBFDSIns1') curdepth,maxdepth
AMQ8409: Display Queue details.
QUEUE(PAPL.ESB.FDS.DELIVERYCONSTRUCT.QUEUE.ESBFDSIns1)
TYPE(QLOCAL) CURDEPTH(553)
MAXDEPTH(15000)

One MQSC command read.
No commands have a syntax error.
All valid MQSC commands were processed.
5724-H72 (C) Copyright IBM Corp. 1994, 2015.
Starting MQSC for queue manager PAPL_ESB_FDS_PRD_QM_223.

0 Karma
1 Solution

vik_splunk
Communicator

HI @vickram , The below should work for you.

<base search>|rex "(?i)MAXDEPTH\((?P<Maxdepth>[^\)]+)"|rex "(?i)CURDEPTH\((?P<Curdepth>[^\)]+)"|stats count by Maxdepth,Curdepth

View solution in original post

0 Karma

vickram
New Member

index=aiam_mywizard_esb_queuedepth_analysis
|rex "(?i)MAXDEPTH((?P[^)]+)"
|rex "(?i)CURDEPTH((?P[^)]+)"
|rex "(?i)QUEUE((?P[^)]+)"
|rex "(?i)TYPE((?P[^)]+)"
| table Maxdepth Curdepth Queue type

Thanks for the help. I have made the above query. I need to calculate the percentage of the "Maxdepth" field and compare with the "Curdepth" field and find the event When the "Curdepth" reaches 75% of the "Maxdepth".
Can you please help on this.

0 Karma

vik_splunk
Communicator

HI @vickram , The below should work for you.

<base search>|rex "(?i)MAXDEPTH\((?P<Maxdepth>[^\)]+)"|rex "(?i)CURDEPTH\((?P<Curdepth>[^\)]+)"|stats count by Maxdepth,Curdepth

0 Karma

vickram
New Member

Thanks for the help vik

0 Karma

vickram
New Member

index=aiam_mywizard_esb_queuedepth_analysis
|rex "(?i)MAXDEPTH((?P[^)]+)"
|rex "(?i)CURDEPTH((?P[^)]+)"
|rex "(?i)QUEUE((?P[^)]+)"
|rex "(?i)TYPE((?P[^)]+)"
| table Maxdepth Curdepth Queue type

Thanks for the help. I have made the above query. I need to calculate the percentage of the "Maxdepth" field and compare with the "Curdepth" field and find the event When the "Curdepth" reaches 75% of the "Maxdepth".
Can you please help on this.

0 Karma

vik_splunk
Communicator

Add the below after the current query @vickram

|eval Percentage=(Curdepth/Maxdepth)*100|where Percentage>=75
0 Karma

diogofgm
SplunkTrust
SplunkTrust

In search you can use:

| rex "CURDEPTH\((?<cur_depth>[^\)]+)\)"
| rex "MAXDEPTH\((?<max_depth>[^\)]+)\)"

in props you can use the same regex in a EXTRACT-field = ...

------------
Hope I was able to help you. If so, some karma would be appreciated.
0 Karma

vickram
New Member

Works perfectly 😉 thanks much

0 Karma

vickram
New Member

index=aiam_mywizard_esb_queuedepth_analysis
|rex "(?i)MAXDEPTH((?P[^)]+)"
|rex "(?i)CURDEPTH((?P[^)]+)"
|rex "(?i)QUEUE((?P[^)]+)"
|rex "(?i)TYPE((?P[^)]+)"
| table Maxdepth Curdepth Queue type

Thanks for the help. I have made the above query. I need to calculate the percentage of the "Maxdepth" field and compare with the "Curdepth" field and find the event When the "Curdepth" reaches 75% of the "Maxdepth".
Can you please help on this.

0 Karma
Get Updates on the Splunk Community!

More Ways To Control Your Costs With Archived Metrics | Register for Tech Talk

Tuesday, May 14, 2024  |  11AM PT / 2PM ET Register to Attend Join us for this Tech Talk and learn how to ...

.conf24 | Personalize your .conf experience with Learning Paths!

Personalize your .conf24 Experience Learning paths allow you to level up your skill sets and dive deeper ...

Threat Hunting Unlocked: How to Uplevel Your Threat Hunting With the PEAK Framework ...

WATCH NOWAs AI starts tackling low level alerts, it's more critical than ever to uplevel your threat hunting ...