Splunk
From neil.tappsville.com
Jump to navigationJump to searchMatch Value (.*) after "want:" and turn it into a field (field_name)
| rex field=_raw "some text before what we want:(?<field_name>.*)"
Group results into 1 hour chunks
| timechart span=1h count(field_name) by field_name
Export RAW logs host=<host_name> | table _raw | outputcsv rawdump.csv Then download as csv