I use basic Splunk queries mostly, like
index=myIndexHere source="path/to/logs/app.log" "Keyword to Filter Query On Example"
My question is, I want to find logs that have a value called "Time taken:"
. Ok, that's great - based on what I wrote above, I know how to do that. I get a bunch of search results back in Splunk, that is in a JSON-style (this is logging from my Java Spring Boot application), i.e.
Object state is { "key1": "value",
"key2": "value",
"key3": "value"
}, Time taken: 500 ms
So it's some format like that. How can I filter/extract the "Time taken:" VALUE
(just the numeric portion) and do a simple logic condition like "> 1000ms
" such that I only get search results back that are greater than 1000ms?