<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Field extraction issue in Splunk Search</title>
    <link>https://community.splunk.com/t5/Splunk-Search/Field-extraction-issue/m-p/43572#M10238</link>
    <description>&lt;P&gt;Your sample data does not include the event containing "name3" so it's hard to say what goes wrong there...&lt;/P&gt;</description>
    <pubDate>Mon, 26 Nov 2012 07:47:44 GMT</pubDate>
    <dc:creator>Ayn</dc:creator>
    <dc:date>2012-11-26T07:47:44Z</dc:date>
    <item>
      <title>Field extraction issue</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Field-extraction-issue/m-p/43569#M10235</link>
      <description>&lt;P&gt;A transaction log format as follows:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;------Procedure[xxx]'s input paramaters:
journalNo = 111111
custormerId = 22222
payAccName = test1
payAcct = 12000000312313131
recAccName = name1
recAcct = 795729419
hostCode = 23131
businessCode = CB704
------Procedure[xxx]'s input paramaters:
recAccName = name1
recAcct = 795729419
tranAmt = 40378.00
custormerId = 22222
------Procedure[xxx]'s input paramaters:
recAccName = name2
recAcct = 192723415
tranAmt = 13033.00
custormerId = 22222
------Procedure[xxx]'s output paramaters:
procRetCode = 00000
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;I extract field of recAccName(field of recAccName contains name1 name2 name3 name4 name5).Field extraction: &lt;CODE&gt;(?i)\nrecAccName\s=\s(?P&amp;lt;ebank_recAccName&amp;gt;\S+)&lt;/CODE&gt; .After extract,field of ebank_recAccName only have name1 name2 name4 name5.Why?&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;[ebankraw]
SHOULD_LINEMERGE = False
KV_MODE = none
TIME_PREFIX = \[
TIME_FORMAT = %y-%m-%d %H:%M:%S:%3N
TZ =Asia/Shanghai
NO_BINARY_CHECK = true
invalid_cause = archive
unarchive_cmd = _auto
CHARSET = GB2312
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;Yes,there are more rows in my events,with recAccName = name3 name4 name5 name6 name7 etc.It's just a sample.&lt;/P&gt;</description>
      <pubDate>Fri, 23 Nov 2012 08:54:05 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Field-extraction-issue/m-p/43569#M10235</guid>
      <dc:creator>snowye</dc:creator>
      <dc:date>2012-11-23T08:54:05Z</dc:date>
    </item>
    <item>
      <title>Re: Field extraction issue</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Field-extraction-issue/m-p/43570#M10236</link>
      <description>&lt;P&gt;Could you post your props/transforms?&lt;/P&gt;</description>
      <pubDate>Fri, 23 Nov 2012 08:56:46 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Field-extraction-issue/m-p/43570#M10236</guid>
      <dc:creator>Drainy</dc:creator>
      <dc:date>2012-11-23T08:56:46Z</dc:date>
    </item>
    <item>
      <title>Re: Field extraction issue</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Field-extraction-issue/m-p/43571#M10237</link>
      <description>&lt;P&gt;You mean you found value "交易3" was lost in the multi valued field? &lt;/P&gt;</description>
      <pubDate>Fri, 23 Nov 2012 09:03:14 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Field-extraction-issue/m-p/43571#M10237</guid>
      <dc:creator>sonicant</dc:creator>
      <dc:date>2012-11-23T09:03:14Z</dc:date>
    </item>
    <item>
      <title>Re: Field extraction issue</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Field-extraction-issue/m-p/43572#M10238</link>
      <description>&lt;P&gt;Your sample data does not include the event containing "name3" so it's hard to say what goes wrong there...&lt;/P&gt;</description>
      <pubDate>Mon, 26 Nov 2012 07:47:44 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Field-extraction-issue/m-p/43572#M10238</guid>
      <dc:creator>Ayn</dc:creator>
      <dc:date>2012-11-26T07:47:44Z</dc:date>
    </item>
    <item>
      <title>Re: Field extraction issue</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Field-extraction-issue/m-p/43573#M10239</link>
      <description>&lt;P&gt;Your sample only contains name1 and name2. Are you saying that there are more rows in your events, with other &lt;CODE&gt;recAccName = xxx&lt;/CODE&gt; lines?&lt;/P&gt;

&lt;P&gt;Not really sure about what you're trying to accomplish, but have you looked at MV_ADD=true in transforms.conf (called from props.conf)?&lt;/P&gt;

&lt;P&gt;&lt;A href="http://docs.splunk.com/Documentation/Splunk/5.0.1/Knowledge/Createandmaintainsearch-timefieldextractionsthroughconfigurationfiles"&gt;http://docs.splunk.com/Documentation/Splunk/5.0.1/Knowledge/Createandmaintainsearch-timefieldextractionsthroughconfigurationfiles&lt;/A&gt;&lt;/P&gt;

&lt;P&gt;/k&lt;/P&gt;</description>
      <pubDate>Mon, 26 Nov 2012 07:55:35 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Field-extraction-issue/m-p/43573#M10239</guid>
      <dc:creator>kristian_kolb</dc:creator>
      <dc:date>2012-11-26T07:55:35Z</dc:date>
    </item>
    <item>
      <title>Re: Field extraction issue</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Field-extraction-issue/m-p/43574#M10240</link>
      <description>&lt;P&gt;Not sure what you are trying to accomplish either, but it seems that every &lt;STRONG&gt;------Procedure[xxx]'s input paramaters:&lt;/STRONG&gt; is its own event.  Why not use &lt;STRONG&gt;BREAK_ONLY_BEFORE = -{6}Procedure&lt;/STRONG&gt;? Since everything seem to be in key=value splunk should auto-extract. Which should get around haveing to use &lt;STRONG&gt;MV_ADD=true&lt;/STRONG&gt;.&lt;/P&gt;</description>
      <pubDate>Mon, 28 Sep 2020 14:20:43 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Field-extraction-issue/m-p/43574#M10240</guid>
      <dc:creator>bmacias84</dc:creator>
      <dc:date>2020-09-28T14:20:43Z</dc:date>
    </item>
    <item>
      <title>Re: Field extraction issue</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Field-extraction-issue/m-p/43575#M10241</link>
      <description>&lt;P&gt;Change&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;KV_MODE = none
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;to:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;KV_MODE = auto
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;And Splunk should extract the field automatically.&lt;/P&gt;</description>
      <pubDate>Thu, 18 Jul 2013 20:13:27 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Field-extraction-issue/m-p/43575#M10241</guid>
      <dc:creator>mloven_splunk</dc:creator>
      <dc:date>2013-07-18T20:13:27Z</dc:date>
    </item>
  </channel>
</rss>

