Reputation: 4428
We have an application that generates logs in the following manner:
task1: spend 51milliseconds
task2: spend 40milliseconds
task3: spend 30milliseconds
task1: spend 101milliseconds
We want to filter Splunk results such that it only shows logs entries where spend is more than 100milliseconds.
What is the best way to do that?
Upvotes: 0
Views: 821
Reputation: 56
Try,(assuming field name is log)
selects 3 digit values, by excluding first digit-if it is 0
| regex log="spend [1-9]{1}[0-9]{2}milliseconds"| table log
OR try
this will include morethan 3 digit values also
| regex log="spend [1-9]{1}\d\d+milliseconds"| table log
Upvotes: 1
Reputation: 4428
This works:
| rex "spend (?<timespent>.*)milliseconds" |WHERE timespent>100
Upvotes: 3