<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Custom calculated Field-Extraction in Splunk Search</title>
    <link>https://community.splunk.com/t5/Splunk-Search/Custom-calculated-Field-Extraction/m-p/62263#M15392</link>
    <description>&lt;P&gt;I resolved this by using eventstats at search time. Assigned a unique ID at run-time.&lt;/P&gt;</description>
    <pubDate>Tue, 11 Aug 2015 06:04:36 GMT</pubDate>
    <dc:creator>meenal901</dc:creator>
    <dc:date>2015-08-11T06:04:36Z</dc:date>
    <item>
      <title>Custom calculated Field-Extraction</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Custom-calculated-Field-Extraction/m-p/62259#M15388</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;

&lt;P&gt;I have a data of the form:&lt;BR /&gt;
Source,Date,Time&lt;BR /&gt;
Source1,20120904,000000&lt;BR /&gt;
Source3,20120904,000000&lt;BR /&gt;
Source1,20120904,000000&lt;BR /&gt;
Source4,20120904,000000&lt;BR /&gt;
Source2,20120904,000000&lt;BR /&gt;
Source3,20120904,000000&lt;BR /&gt;
Source4,20120904,000000&lt;BR /&gt;
Source2,20120904,000000&lt;/P&gt;

&lt;P&gt;When i upload this file, i want to sort is based on column "Source" and add a custom column called "Unique_ID" which will have value of time+1 for same Source. Effectively, the data should look like:&lt;/P&gt;

&lt;P&gt;Source,Date,Time&lt;BR /&gt;
Source1,20120904,000001&lt;BR /&gt;
Source1,20120904,000002&lt;BR /&gt;
Source2,20120904,000001&lt;BR /&gt;
Source2,20120904,000002&lt;BR /&gt;
Source3,20120904,000001&lt;BR /&gt;
Source3,20120904,000002&lt;BR /&gt;
Source4,20120904,000001&lt;BR /&gt;
Source4,20120904,000002&lt;/P&gt;

&lt;P&gt;What regex should be written to props.conf and transforms.conf to do the same?&lt;/P&gt;</description>
      <pubDate>Thu, 13 Dec 2012 11:11:16 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Custom-calculated-Field-Extraction/m-p/62259#M15388</guid>
      <dc:creator>meenal901</dc:creator>
      <dc:date>2012-12-13T11:11:16Z</dc:date>
    </item>
    <item>
      <title>Re: Custom calculated Field-Extraction</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Custom-calculated-Field-Extraction/m-p/62260#M15389</link>
      <description>&lt;P&gt;Regular expressions can neither sort nor count nor do maths. For that you need a more powerful language, such as a scripted input that does this work for you.&lt;/P&gt;

&lt;P&gt;What's the ultimate goal you're trying to achieve here?&lt;/P&gt;</description>
      <pubDate>Thu, 13 Dec 2012 14:29:29 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Custom-calculated-Field-Extraction/m-p/62260#M15389</guid>
      <dc:creator>martin_mueller</dc:creator>
      <dc:date>2012-12-13T14:29:29Z</dc:date>
    </item>
    <item>
      <title>Re: Custom calculated Field-Extraction</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Custom-calculated-Field-Extraction/m-p/62261#M15390</link>
      <description>&lt;P&gt;Yes i understand the limitation of regex. The data is in a bucket of 15 minutes. I need a way to co-relate events of a source with another. A unique key at the time of adding data. But couldn't find.&lt;/P&gt;</description>
      <pubDate>Fri, 14 Dec 2012 12:05:13 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Custom-calculated-Field-Extraction/m-p/62261#M15390</guid>
      <dc:creator>meenal901</dc:creator>
      <dc:date>2012-12-14T12:05:13Z</dc:date>
    </item>
    <item>
      <title>Re: Custom calculated Field-Extraction</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Custom-calculated-Field-Extraction/m-p/62262#M15391</link>
      <description>&lt;P&gt;You could use the &lt;CODE&gt;_indextime&lt;/CODE&gt; field to check when events were indexed, and then use that (if I understood your scenario correctly).&lt;/P&gt;</description>
      <pubDate>Fri, 14 Dec 2012 12:43:17 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Custom-calculated-Field-Extraction/m-p/62262#M15391</guid>
      <dc:creator>Ayn</dc:creator>
      <dc:date>2012-12-14T12:43:17Z</dc:date>
    </item>
    <item>
      <title>Re: Custom calculated Field-Extraction</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Custom-calculated-Field-Extraction/m-p/62263#M15392</link>
      <description>&lt;P&gt;I resolved this by using eventstats at search time. Assigned a unique ID at run-time.&lt;/P&gt;</description>
      <pubDate>Tue, 11 Aug 2015 06:04:36 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Custom-calculated-Field-Extraction/m-p/62263#M15392</guid>
      <dc:creator>meenal901</dc:creator>
      <dc:date>2015-08-11T06:04:36Z</dc:date>
    </item>
  </channel>
</rss>

