hello guyz,
new to splunk was to figure out solution for this.
I have logs like below need to do " rex" and extract 2 values (1st and 4th) from each log with set like [23,23.000,89.375,35,0], [1,1.000,16.000,4,0] etc.
ex.,
value1- "23" and save in new field with name conferences from every log
value4- "35" and save in new field with name calls from every log
(sample logs)
server: [USAGE] : {"2" : [23,23.000,89.375,35,0]}
host = us-voice-vmr11.corp.com
server: [USAGE] : {"2" : [1,1.000,16.000,4,0]}
host = gs-voice-vmr12.corp.com
server: [USAGE] : {"2" : [7,7.000,41.100,16,0]}
host = ks-voice-vmr13.corp.com
thanks
↧