<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Splunk Field Extraction in Splunk Search</title>
    <link>https://community.splunk.com/t5/Splunk-Search/Splunk-Field-Extraction/m-p/474684#M133481</link>
    <description>&lt;P&gt;Hi @cyber_castle,&lt;BR /&gt;
Yes it's normal:&lt;/P&gt;

&lt;UL&gt;
&lt;LI&gt;if you create an alias you have both the fields,&lt;/LI&gt;
&lt;LI&gt;also using a regex you continue to have all the automatic field extractions so you'll have both the field names.&lt;/LI&gt;
&lt;/UL&gt;

&lt;P&gt;the only way to avoid to have both the field names is to insert a rename in all your searches.&lt;/P&gt;

&lt;P&gt;Ciao.&lt;BR /&gt;
Giuseppe&lt;/P&gt;</description>
    <pubDate>Thu, 20 Feb 2020 11:46:55 GMT</pubDate>
    <dc:creator>gcusello</dc:creator>
    <dc:date>2020-02-20T11:46:55Z</dc:date>
    <item>
      <title>Splunk Field Extraction</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Splunk-Field-Extraction/m-p/474683#M133480</link>
      <description>&lt;P&gt;I have indexed few sample logs in to the Splunk.. &lt;/P&gt;

&lt;P&gt;&lt;EM&gt;2020-02-15T10:41:54.305Z servername.com  sev="INFO" msg_details="Audit success" pol_name="policy_name"&lt;/EM&gt;&lt;/P&gt;

&lt;P&gt;Splunk by default extract the fields sev, msg_details, pol_name and extract the values appropriately. Everything loos good.&lt;/P&gt;

&lt;P&gt;For me, i need to rename the field as severity instead of sev,  Description instead of  msg_details and Policies instead of pol_name.&lt;/P&gt;

&lt;P&gt;I have updated the props.conf &lt;/P&gt;

&lt;P&gt;&lt;CODE&gt;[sourcetype]&lt;BR /&gt;
FIELDALIAS-severity = sev AS Severity &lt;BR /&gt;
FIELDALIAS-msg_details = msg_details AS Description&lt;BR /&gt;
FIELDALIAS-pol_name = pol_name AS Policies&lt;/CODE&gt;&lt;/P&gt;

&lt;P&gt;Fields are extracting properly.  &lt;/P&gt;

&lt;P&gt;When i run the search on Verbose Mode, i can see both sev and Severity, which is quiet annoying for the Analysts &lt;/P&gt;

&lt;P&gt;Is it normal or do i have to write a EXTRACT function with appropriate REGEX in order to show only the Severity field NOT sev.&lt;/P&gt;</description>
      <pubDate>Wed, 30 Sep 2020 04:15:24 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Splunk-Field-Extraction/m-p/474683#M133480</guid>
      <dc:creator>cyber_castle</dc:creator>
      <dc:date>2020-09-30T04:15:24Z</dc:date>
    </item>
    <item>
      <title>Re: Splunk Field Extraction</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Splunk-Field-Extraction/m-p/474684#M133481</link>
      <description>&lt;P&gt;Hi @cyber_castle,&lt;BR /&gt;
Yes it's normal:&lt;/P&gt;

&lt;UL&gt;
&lt;LI&gt;if you create an alias you have both the fields,&lt;/LI&gt;
&lt;LI&gt;also using a regex you continue to have all the automatic field extractions so you'll have both the field names.&lt;/LI&gt;
&lt;/UL&gt;

&lt;P&gt;the only way to avoid to have both the field names is to insert a rename in all your searches.&lt;/P&gt;

&lt;P&gt;Ciao.&lt;BR /&gt;
Giuseppe&lt;/P&gt;</description>
      <pubDate>Thu, 20 Feb 2020 11:46:55 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Splunk-Field-Extraction/m-p/474684#M133481</guid>
      <dc:creator>gcusello</dc:creator>
      <dc:date>2020-02-20T11:46:55Z</dc:date>
    </item>
    <item>
      <title>Re: Splunk Field Extraction</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Splunk-Field-Extraction/m-p/474685#M133482</link>
      <description>&lt;P&gt;Thanks a lot for your prompt response.&lt;/P&gt;</description>
      <pubDate>Thu, 20 Feb 2020 12:05:56 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Splunk-Field-Extraction/m-p/474685#M133482</guid>
      <dc:creator>cyber_castle</dc:creator>
      <dc:date>2020-02-20T12:05:56Z</dc:date>
    </item>
  </channel>
</rss>

