<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Field Extractions in Search Head GUI in Splunk Search</title>
    <link>https://community.splunk.com/t5/Splunk-Search/Field-Extractions-in-Search-Head-GUI/m-p/372638#M163976</link>
    <description>&lt;P&gt;see for this particular event you can use&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;ServiceName=(?P&amp;lt;Name&amp;gt;[^|]*)|DropId=(?P&amp;lt;Id&amp;gt;[^\|]*)|Job=\((?P&amp;lt;Job&amp;gt;[^\)]*)\)|JobNumber=\((?P&amp;lt;JobNumber&amp;gt;[^\)]*)\)|DropNumber=\((?P&amp;lt;DropNumber&amp;gt;[^\)]*)\)|StampCycle=(?P&amp;lt;StampCycle&amp;gt;[^\|]*)|TotalFiles\=(?P&amp;lt;Field&amp;gt;[^\|]*)|FileId=(?P&amp;lt;FileId&amp;gt;[^\|]*)
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;Let me know if this helps !&lt;/P&gt;</description>
    <pubDate>Mon, 08 Jan 2018 13:30:10 GMT</pubDate>
    <dc:creator>mayurr98</dc:creator>
    <dc:date>2018-01-08T13:30:10Z</dc:date>
    <item>
      <title>Field Extractions in Search Head GUI</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Field-Extractions-in-Search-Head-GUI/m-p/372626#M163964</link>
      <description>&lt;P&gt;Hi Team,&lt;/P&gt;

&lt;P&gt;I have an event which is getting segregated with pipe (|) symbol and i want to separate those events with a regex expression how to proceed further.&lt;/P&gt;

&lt;P&gt;Sample Event are below:&lt;/P&gt;

&lt;P&gt;2017-06-04 03:51|Level=***|Name=Men|Id=(xxxxx)|Job=(xxxx)|DropNumber=(xxxx)|Cycle=(xxx)|Value=(xxx)|Field=(xxxx)|Process xxxxxxxx&lt;/P&gt;

&lt;P&gt;So I have tried to segregate the same in search head GUI by clicking the Field extractions and by using delimit option i choose pipe (|) symbol to split it.&lt;/P&gt;

&lt;P&gt;The fields are getting extracted and I have renamed the field names too. But once I saved it and clicked the extracted fields which is in left hand column its getting with the field name and with the key value. But actually i want the key value alone.&lt;/P&gt;

&lt;P&gt;For Example:&lt;/P&gt;

&lt;P&gt;If i have delimit the field using (|) symbol and rename the field to "Name" and saved it.&lt;/P&gt;

&lt;P&gt;Post saving it when i click the "Name" in the extracted field it should show as "Men" as mentioned in sample event.&lt;/P&gt;

&lt;P&gt;But instead when i click the "Name" field it shows as "Name=Men"&lt;/P&gt;

&lt;P&gt;So kindly let me know the regex to extract only the key value alone since i need to create multiple field extractions for the same.&lt;/P&gt;</description>
      <pubDate>Thu, 04 Jan 2018 13:40:43 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Field-Extractions-in-Search-Head-GUI/m-p/372626#M163964</guid>
      <dc:creator>anandhalagarasa</dc:creator>
      <dc:date>2018-01-04T13:40:43Z</dc:date>
    </item>
    <item>
      <title>Re: Field Extractions in Search Head GUI</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Field-Extractions-in-Search-Head-GUI/m-p/372627#M163965</link>
      <description>&lt;P&gt;One way is to take the name as the beginning pattern for the regex.&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;| rex field=_raw "\|Name=(?&amp;lt;name&amp;gt;\S+)|ID=\((?&amp;lt;id&amp;gt;\S+)\)\|"
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;another way is to put these regex into a transforms.conf on the searchhead.&lt;/P&gt;

&lt;P&gt;/local/props.conf&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;[&amp;lt;your_sourcetype&amp;gt;]
REPORT_extract_b1  = extr_pats
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;/local/transforms.conf&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;[extr_pats]
REGEX = \|Name=(?&amp;lt;name&amp;gt;\S+)|ID=\((?&amp;lt;id&amp;gt;\S+)\)\|
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;Another way is with DELIMS&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;[extr_pats]
DELIMS = "=|"
FIELDS = "temp1","name",temp2","id"
&lt;/CODE&gt;&lt;/PRE&gt;</description>
      <pubDate>Thu, 04 Jan 2018 13:54:43 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Field-Extractions-in-Search-Head-GUI/m-p/372627#M163965</guid>
      <dc:creator>Elsurion</dc:creator>
      <dc:date>2018-01-04T13:54:43Z</dc:date>
    </item>
    <item>
      <title>Re: Field Extractions in Search Head GUI</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Field-Extractions-in-Search-Head-GUI/m-p/372628#M163966</link>
      <description>&lt;P&gt;Hey &lt;/P&gt;

&lt;P&gt;Go to settings&amp;gt;fields&amp;gt;field extractions&amp;gt;new and put below regex&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;Level=(?P&amp;lt;Level&amp;gt;[^|]*)|Name=(?P&amp;lt;Name&amp;gt;[^|]*)|Id=\((?P&amp;lt;Id&amp;gt;[^\)]*)\)|Job=\((?P&amp;lt;Job&amp;gt;[^\)]*)\)|DropNumber=\((?P&amp;lt;DropNumber&amp;gt;[^\)]*)\)|Cycle=\((?P&amp;lt;Cycle&amp;gt;[^\)]*)\)|Value=\((?P&amp;lt;Value&amp;gt;[^\)]*)\)|Field=\((?P&amp;lt;Field&amp;gt;[^\)]*)\)|Process\s(?P&amp;lt;Process&amp;gt;.*)
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;Also you can try in search query and look for field value using below query.&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;index=your_index | rex field=_raw “Level=(?P&amp;lt;Level&amp;gt;[^|]*)|Name=(?P&amp;lt;Name&amp;gt;[^|]*)|Id=\((?P&amp;lt;Id&amp;gt;[^\)]*)\)|Job=\((?P&amp;lt;Job&amp;gt;[^\)]*)\)|DropNumber=\((?P&amp;lt;DropNumber&amp;gt;[^\)]*)\)|Cycle=\((?P&amp;lt;Cycle&amp;gt;[^\)]*)\)|Value=\((?P&amp;lt;Value&amp;gt;[^\)]*)\)|Field=\((?P&amp;lt;Field&amp;gt;[^\)]*)\)|Process\s(?P&amp;lt;Process&amp;gt;.*)”
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;After that you can see all the field on the left side. With field value pair as you wanted&lt;/P&gt;

&lt;P&gt;Let me know if this helps you !&lt;/P&gt;</description>
      <pubDate>Thu, 04 Jan 2018 15:35:02 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Field-Extractions-in-Search-Head-GUI/m-p/372628#M163966</guid>
      <dc:creator>mayurr98</dc:creator>
      <dc:date>2018-01-04T15:35:02Z</dc:date>
    </item>
    <item>
      <title>Re: Field Extractions in Search Head GUI</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Field-Extractions-in-Search-Head-GUI/m-p/372629#M163967</link>
      <description>&lt;P&gt;Splunk appears to automatically extract these fields, as they are Key=Value.  Does your sourcetype set &lt;CODE&gt;KV_MODE = none&lt;/CODE&gt;?&lt;/P&gt;</description>
      <pubDate>Thu, 04 Jan 2018 19:47:28 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Field-Extractions-in-Search-Head-GUI/m-p/372629#M163967</guid>
      <dc:creator>micahkemp</dc:creator>
      <dc:date>2018-01-04T19:47:28Z</dc:date>
    </item>
    <item>
      <title>Re: Field Extractions in Search Head GUI</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Field-Extractions-in-Search-Head-GUI/m-p/372630#M163968</link>
      <description>&lt;P&gt;Thanks for your suggestion. All fields are working fine except the last one that is "Field".&lt;/P&gt;

&lt;P&gt;Sample Event :&lt;/P&gt;

&lt;P&gt;2017-06-04 03:51|Level=***|Name=Men|Id=(xxxxx)|Job=(xxxx)|DropNumber=(xxxx)|Cycle=(xxx)|Value=(xxx)|Field=(xxxx)|Process xxxxxxxx&lt;/P&gt;

&lt;P&gt;Here in this case the "Field" is getting extracted along with Process information.&lt;/P&gt;

&lt;P&gt;When I click "Field" in extracted fields the results are as below:&lt;/P&gt;

&lt;P&gt;xxxxxxx&lt;BR /&gt;
xxxxxxx|Processs xxxxxx&lt;/P&gt;

&lt;P&gt;But i need to exclude the Process one and get only the key value xxxxxxx.&lt;/P&gt;

&lt;P&gt;So kindly help to provide regex for the same.&lt;/P&gt;</description>
      <pubDate>Fri, 05 Jan 2018 06:56:27 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Field-Extractions-in-Search-Head-GUI/m-p/372630#M163968</guid>
      <dc:creator>anandhalagarasa</dc:creator>
      <dc:date>2018-01-05T06:56:27Z</dc:date>
    </item>
    <item>
      <title>Re: Field Extractions in Search Head GUI</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Field-Extractions-in-Search-Head-GUI/m-p/372631#M163969</link>
      <description>&lt;P&gt;hey @anandhalagarasan&lt;/P&gt;

&lt;P&gt;have you tried above regex?&lt;BR /&gt;
you will be able to extract &lt;CODE&gt;process&lt;/CODE&gt; with a value &lt;CODE&gt;xxxx&lt;/CODE&gt;as well with all the desired results !&lt;/P&gt;

&lt;P&gt;let me know if this works!&lt;/P&gt;</description>
      <pubDate>Fri, 05 Jan 2018 07:05:27 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Field-Extractions-in-Search-Head-GUI/m-p/372631#M163969</guid>
      <dc:creator>mayurr98</dc:creator>
      <dc:date>2018-01-05T07:05:27Z</dc:date>
    </item>
    <item>
      <title>Re: Field Extractions in Search Head GUI</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Field-Extractions-in-Search-Head-GUI/m-p/372632#M163970</link>
      <description>&lt;P&gt;Hey @anandhalagarasan&lt;/P&gt;

&lt;P&gt;Ignore my previous answer.&lt;BR /&gt;
You can try below regex.&lt;/P&gt;

&lt;P&gt;&lt;STRONG&gt;rex field=_raw "^(?P.+)|Level=(?P[^|]+)|Name=(?P.+)|Id=((?P.+))|Job=((?P.+))|DropNumber=((?P.+))|Cycle=((?P.+))|Value=((?P.+))|Field=((?P.+))|Process\s(?P.+)"&lt;/STRONG&gt;&lt;/P&gt;

&lt;P&gt;I have checked this on regex101.com and its working fine.You can also use this regex in transforms.conf file.&lt;/P&gt;</description>
      <pubDate>Fri, 05 Jan 2018 07:34:14 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Field-Extractions-in-Search-Head-GUI/m-p/372632#M163970</guid>
      <dc:creator>abhijeet01</dc:creator>
      <dc:date>2018-01-05T07:34:14Z</dc:date>
    </item>
    <item>
      <title>Re: Field Extractions in Search Head GUI</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Field-Extractions-in-Search-Head-GUI/m-p/372633#M163971</link>
      <description>&lt;P&gt;Did you use the inline or the props/transforms one?&lt;/P&gt;

&lt;P&gt;For inline it would be&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;| rex field=Field "\|\w+\s+(?&amp;lt;process&amp;gt;.+)"
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;for props/transforms with DELIMS it would be this example&lt;BR /&gt;
tranforms.conf rewrite&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt; [&amp;lt;your_sourcetype&amp;gt;]
 REPORT_extract_b1  = extr_pats
 REPORT_newfield = new_extr
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;props.conf add&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;[new_extr]
REGEX = "\|\w+\s+(?&amp;lt;process&amp;gt;.+)"
SOURCE_KEY = Field
&lt;/CODE&gt;&lt;/PRE&gt;</description>
      <pubDate>Fri, 05 Jan 2018 08:45:23 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Field-Extractions-in-Search-Head-GUI/m-p/372633#M163971</guid>
      <dc:creator>Elsurion</dc:creator>
      <dc:date>2018-01-05T08:45:23Z</dc:date>
    </item>
    <item>
      <title>Re: Field Extractions in Search Head GUI</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Field-Extractions-in-Search-Head-GUI/m-p/372634#M163972</link>
      <description>&lt;P&gt;Hi mayurr98,&lt;/P&gt;

&lt;P&gt;Thanks for your response. But still it didn't worked.&lt;/P&gt;

&lt;P&gt;Let me show the actual raw event from this example can you help to retrieve those 8 fields.&lt;/P&gt;

&lt;P&gt;2018-01-07 01:50:39,296|INFO|ServiceName=xxxx|DropId=xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxx|JobNumber=(xxx)|DropNumber=(xxx)|StampCycle=xxxx|TotalFiles=xx|FileId=xxxxxxx-xxx-xxxx-xxxx-xxxxxxxxxxxxxxx|QueueName: xxx_xxxxx_xxxxxx, GUID: xxxxxx-xxxx-xxxx-xxxx-xxxxxxx&lt;/P&gt;

&lt;P&gt;I just want to extract the following fields without any issues.&lt;/P&gt;

&lt;P&gt;ServiceName&lt;BR /&gt;
DropId&lt;BR /&gt;
JobNumber&lt;BR /&gt;
DropNumber&lt;BR /&gt;
StampCycle&lt;BR /&gt;
TotalFiles&lt;BR /&gt;
FileId&lt;/P&gt;

&lt;P&gt;And as mentioned in your regex expression i can able to extract all fields perfectly except "FileId" alone.&lt;/P&gt;

&lt;P&gt;When i extract FileId and when i click the FileId its getting extracted along with (|) pipe symbol and QueueName information.&lt;/P&gt;

&lt;P&gt;xxxxxxx-xxx-xxxx-xxxx-xxxxxxxxxxxxxxx|QueueName: xxx_xxxxx_xxxxxx&lt;/P&gt;

&lt;P&gt;But actually i need only the FileId value alone and it should not be extracting any messages post FileId Since I need to extract only till FileId.&lt;/P&gt;

&lt;P&gt;Is there any way to get it achieved. &lt;/P&gt;

&lt;P&gt;NOTE:&lt;BR /&gt;
For few instances alone its getting extracted with | information followed by FileId and the remaining FileId values are getting extracted perfectly.&lt;/P&gt;</description>
      <pubDate>Tue, 29 Sep 2020 17:30:22 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Field-Extractions-in-Search-Head-GUI/m-p/372634#M163972</guid>
      <dc:creator>anandhalagarasa</dc:creator>
      <dc:date>2020-09-29T17:30:22Z</dc:date>
    </item>
    <item>
      <title>Re: Field Extractions in Search Head GUI</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Field-Extractions-in-Search-Head-GUI/m-p/372635#M163973</link>
      <description>&lt;P&gt;Hi abhijeet01,&lt;/P&gt;

&lt;P&gt;Thanks for your response. But still it didn't worked.&lt;/P&gt;

&lt;P&gt;Let me show the actual raw event from this example can you help to retrieve those 8 fields.&lt;BR /&gt;
2018-01-07 01:50:39,296|INFO|ServiceName=xxxx|DropId=xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxx|JobNumber=(xxx)|DropNumber=(xxx)|StampCycle=xxxx|TotalFiles=xx|FileId=xxxxxxx-xxx-xxxx-xxxx-xxxxxxxxxxxxxxx|QueueName: xxx_xxxxx_xxxxxx, GUID: xxxxxx-xxxx-xxxx-xxxx-xxxxxxx&lt;/P&gt;

&lt;P&gt;I just want to extract the following fields without any issues.&lt;/P&gt;

&lt;P&gt;ServiceName&lt;BR /&gt;
DropId&lt;BR /&gt;
JobNumber&lt;BR /&gt;
DropNumber&lt;BR /&gt;
StampCycle&lt;BR /&gt;
TotalFiles&lt;BR /&gt;
FileId&lt;/P&gt;

&lt;P&gt;And as mentioned in your regex expression i can able to extract all fields perfectly except "FileId" alone.&lt;/P&gt;

&lt;P&gt;When i extract FileId and when i click the FileId its getting extracted along with (|) pipe symbol and QueueName information.&lt;/P&gt;

&lt;P&gt;xxxxxxx-xxx-xxxx-xxxx-xxxxxxxxxxxxxxx|QueueName: xxx_xxxxx_xxxxxx&lt;/P&gt;

&lt;P&gt;But actually i need only the FileId value alone and it should not be extracting any messages post FileId Since I need to extract only till FileId.&lt;/P&gt;

&lt;P&gt;Is there any way to get it achieved. &lt;/P&gt;

&lt;P&gt;NOTE:&lt;BR /&gt;
For few instances alone its getting extracted with | information followed by FileId and the remaining FileId values are getting extracted perfectly.&lt;/P&gt;</description>
      <pubDate>Tue, 29 Sep 2020 17:30:26 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Field-Extractions-in-Search-Head-GUI/m-p/372635#M163973</guid>
      <dc:creator>anandhalagarasa</dc:creator>
      <dc:date>2020-09-29T17:30:26Z</dc:date>
    </item>
    <item>
      <title>Re: Field Extractions in Search Head GUI</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Field-Extractions-in-Search-Head-GUI/m-p/372636#M163974</link>
      <description>&lt;P&gt;Hi Elsurion,&lt;/P&gt;

&lt;P&gt;Thanks for your response. But still it didn't worked.&lt;/P&gt;

&lt;P&gt;Let me show the actual raw event from this example can you help to retrieve those 8 fields.&lt;BR /&gt;
2018-01-07 01:50:39,296|INFO|ServiceName=xxxx|DropId=xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxx|JobNumber=(xxx)|DropNumber=(xxx)|StampCycle=xxxx|TotalFiles=xx|FileId=xxxxxxx-xxx-xxxx-xxxx-xxxxxxxxxxxxxxx|QueueName: xxx_xxxxx_xxxxxx, GUID: xxxxxx-xxxx-xxxx-xxxx-xxxxxxx&lt;/P&gt;

&lt;P&gt;I just want to extract the following fields without any issues.&lt;/P&gt;

&lt;P&gt;ServiceName&lt;BR /&gt;
DropId&lt;BR /&gt;
JobNumber&lt;BR /&gt;
DropNumber&lt;BR /&gt;
StampCycle&lt;BR /&gt;
TotalFiles&lt;BR /&gt;
FileId&lt;/P&gt;

&lt;P&gt;And as mentioned in your regex expression i can able to extract all fields perfectly except "FileId" alone.&lt;/P&gt;

&lt;P&gt;When i extract FileId and when i click the FileId its getting extracted along with (|) pipe symbol and QueueName information.&lt;/P&gt;

&lt;P&gt;xxxxxxx-xxx-xxxx-xxxx-xxxxxxxxxxxxxxx|QueueName: xxx_xxxxx_xxxxxx&lt;/P&gt;

&lt;P&gt;But actually i need only the FileId value alone and it should not be extracting any messages post FileId Since I need to extract only till FileId.&lt;/P&gt;

&lt;P&gt;Is there any way to get it achieved. &lt;/P&gt;

&lt;P&gt;NOTE:&lt;BR /&gt;
For few instances alone its getting extracted with | information followed by FileId and the remaining FileId values are getting extracted perfectly.&lt;/P&gt;</description>
      <pubDate>Tue, 29 Sep 2020 17:30:29 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Field-Extractions-in-Search-Head-GUI/m-p/372636#M163974</guid>
      <dc:creator>anandhalagarasa</dc:creator>
      <dc:date>2020-09-29T17:30:29Z</dc:date>
    </item>
    <item>
      <title>Re: Field Extractions in Search Head GUI</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Field-Extractions-in-Search-Head-GUI/m-p/372637#M163975</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;

&lt;P&gt;Consider this exact sample event and from here i want to extract those fields.&lt;/P&gt;

&lt;P&gt;2018-01-07 01:50:39,296|INFO|ServiceName=xxxx|DropId=xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxx|JobNumber=(xxx)|DropNumber=(xxx)|StampCycle=xxxx|TotalFiles=xx|FileId=xxxxxxx-xxx-xxxx-xxxx-xxxxxxxxxxxxxxx|QueueName: xxx_xxxxx_xxxxxx, GUID: xxxxxx-xxxx-xxxx-xxxx-xxxxxxx&lt;/P&gt;

&lt;P&gt;I just want to extract the following fields without any issues.&lt;/P&gt;

&lt;P&gt;ServiceName&lt;BR /&gt;
DropId&lt;BR /&gt;
JobNumber&lt;BR /&gt;
DropNumber&lt;BR /&gt;
StampCycle&lt;BR /&gt;
TotalFiles&lt;BR /&gt;
FileId&lt;/P&gt;

&lt;P&gt;And as mentioned in your regex expression i can able to extract all fields perfectly except "FileId" alone.&lt;/P&gt;

&lt;P&gt;When i extract FileId and when i click the FileId its getting extracted along with (|) pipe symbol and QueueName information.&lt;/P&gt;

&lt;P&gt;xxxxxxx-xxx-xxxx-xxxx-xxxxxxxxxxxxxxx|QueueName: xxx_xxxxx_xxxxxx&lt;/P&gt;

&lt;P&gt;But actually i need only the FileId value alone and it should not be extracting any messages post FileId Since I need to extract only till FileId.&lt;/P&gt;

&lt;P&gt;Is there any way to get it achieved. &lt;/P&gt;

&lt;P&gt;NOTE:&lt;BR /&gt;
For few instances alone its getting extracted with | information followed by FileId and the remaining FileId values are getting extracted perfectly.&lt;/P&gt;</description>
      <pubDate>Tue, 29 Sep 2020 17:30:32 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Field-Extractions-in-Search-Head-GUI/m-p/372637#M163975</guid>
      <dc:creator>anandhalagarasa</dc:creator>
      <dc:date>2020-09-29T17:30:32Z</dc:date>
    </item>
    <item>
      <title>Re: Field Extractions in Search Head GUI</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Field-Extractions-in-Search-Head-GUI/m-p/372638#M163976</link>
      <description>&lt;P&gt;see for this particular event you can use&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;ServiceName=(?P&amp;lt;Name&amp;gt;[^|]*)|DropId=(?P&amp;lt;Id&amp;gt;[^\|]*)|Job=\((?P&amp;lt;Job&amp;gt;[^\)]*)\)|JobNumber=\((?P&amp;lt;JobNumber&amp;gt;[^\)]*)\)|DropNumber=\((?P&amp;lt;DropNumber&amp;gt;[^\)]*)\)|StampCycle=(?P&amp;lt;StampCycle&amp;gt;[^\|]*)|TotalFiles\=(?P&amp;lt;Field&amp;gt;[^\|]*)|FileId=(?P&amp;lt;FileId&amp;gt;[^\|]*)
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;Let me know if this helps !&lt;/P&gt;</description>
      <pubDate>Mon, 08 Jan 2018 13:30:10 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Field-Extractions-in-Search-Head-GUI/m-p/372638#M163976</guid>
      <dc:creator>mayurr98</dc:creator>
      <dc:date>2018-01-08T13:30:10Z</dc:date>
    </item>
    <item>
      <title>Re: Field Extractions in Search Head GUI</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Field-Extractions-in-Search-Head-GUI/m-p/372639#M163977</link>
      <description>&lt;P&gt;transforms.conf:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;[pipe_key_equals_value]
REGEX = (?&amp;lt;_KEY_1&amp;gt;[^|=]+)=(?&amp;lt;_VAL_1&amp;gt;[^|]+)
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;props.conf:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;[&amp;lt;sourcetype&amp;gt;]
REPORT-pipe_key_equals_value = pipe_key_equals_value
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;To see this in action: &lt;A href="https://regex101.com/r/otQuZ6/1"&gt;https://regex101.com/r/otQuZ6/1&lt;/A&gt;&lt;/P&gt;

&lt;P&gt;Note: When &lt;CODE&gt;_KEY_1&lt;/CODE&gt; and &lt;CODE&gt;_VAL_1&lt;/CODE&gt; are used, splunk will use the value of &lt;CODE&gt;_KEY_1&lt;/CODE&gt; as the field name, and the value of &lt;CODE&gt;_VAL_1&lt;/CODE&gt; as the value of that field.&lt;/P&gt;</description>
      <pubDate>Mon, 08 Jan 2018 16:16:35 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Field-Extractions-in-Search-Head-GUI/m-p/372639#M163977</guid>
      <dc:creator>micahkemp</dc:creator>
      <dc:date>2018-01-08T16:16:35Z</dc:date>
    </item>
    <item>
      <title>Re: Field Extractions in Search Head GUI</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Field-Extractions-in-Search-Head-GUI/m-p/372640#M163978</link>
      <description>&lt;P&gt;Thanks for your response.&lt;BR /&gt;
I have applied the regex as provided but still the last field alone (FileId) is fetching the information along with the message that might be whatever even-though we have a pipe symbol in between..&lt;/P&gt;

&lt;P&gt;Once the field is extracted and when i click the FileId it shows the result as below:&lt;/P&gt;

&lt;P&gt;xxxxxxx-xxx-xxxx-xxxx-xxxxxxxxxxxxxxx|QueueName: xxx_xxxxx_xxxxxx&lt;/P&gt;

&lt;P&gt;Can you kindly help on this.&lt;/P&gt;</description>
      <pubDate>Tue, 29 Sep 2020 17:31:17 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Field-Extractions-in-Search-Head-GUI/m-p/372640#M163978</guid>
      <dc:creator>anandhalagarasa</dc:creator>
      <dc:date>2020-09-29T17:31:17Z</dc:date>
    </item>
    <item>
      <title>Re: Field Extractions in Search Head GUI</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Field-Extractions-in-Search-Head-GUI/m-p/372641#M163979</link>
      <description>&lt;P&gt;The full regex for this string would be this one: &lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;\S+\s\S+\|(?&amp;lt;Status&amp;gt;\w+)\|\w+=(?&amp;lt;ServiceName&amp;gt;\w+)\|\w+=(?&amp;lt;DropId&amp;gt;(\w+-){4}\w+)\|\w+=\(?&amp;lt;JobNumber&amp;gt;(\w+)\)\|\w+=\(?&amp;lt;DropNumber&amp;gt;(\w+)\)|\|\w+=(?&amp;lt;StampCycle&amp;gt;\w+)\|\w+=(?&amp;lt;TotalFiles&amp;gt;\w+)\|\w+=(?&amp;lt;FileId&amp;gt;(\w+-){4}\w+)\|\w+:\s(?&amp;lt;QueueName&amp;gt;\w+),\s\w+:\s(?&amp;lt;GUID&amp;gt;(\w+-){4}\w+)
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;It does not include now special characters like äöü.&lt;BR /&gt;
You could also expand the placeholder \w+ to it's real name like ServiceName, etc. But this is only a solution when you getting faults with the extraction.&lt;/P&gt;

&lt;P&gt;When you encounter some mismatch, you can test the regex also here:&lt;BR /&gt;
&lt;A href="https://regexr.com/"&gt;https://regexr.com/&lt;/A&gt;&lt;BR /&gt;
but you have to remove the fielddefintions, since this page does not recognize it.&lt;/P&gt;</description>
      <pubDate>Tue, 09 Jan 2018 09:46:15 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Field-Extractions-in-Search-Head-GUI/m-p/372641#M163979</guid>
      <dc:creator>Elsurion</dc:creator>
      <dc:date>2018-01-09T09:46:15Z</dc:date>
    </item>
    <item>
      <title>Re: Field Extractions in Search Head GUI</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Field-Extractions-in-Search-Head-GUI/m-p/372642#M163980</link>
      <description>&lt;P&gt;To implement my previous answer via the UI, follow these steps:&lt;/P&gt;

&lt;P&gt;Settings -&amp;gt; Fields -&amp;gt; Field Transformations -&amp;gt; New&lt;/P&gt;

&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper" image-alt="alt text"&gt;&lt;img src="https://community.splunk.com/t5/image/serverpage/image-id/4096iDF78D73010441503/image-size/large?v=v2&amp;amp;px=999" role="button" title="alt text" alt="alt text" /&gt;&lt;/span&gt;&lt;/P&gt;

&lt;P&gt;Set sharting to global&lt;/P&gt;

&lt;P&gt;Settings -&amp;gt; Field Extractions -&amp;gt; New&lt;/P&gt;

&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper" image-alt="alt text"&gt;&lt;img src="https://community.splunk.com/t5/image/serverpage/image-id/4097iBF3B6B38C8484293/image-size/large?v=v2&amp;amp;px=999" role="button" title="alt text" alt="alt text" /&gt;&lt;/span&gt;&lt;/P&gt;

&lt;P&gt;Set sharing to global&lt;/P&gt;

&lt;P&gt;Settings -&amp;gt; Source Types -&amp;gt; Select source type (may have to uncheck "Show only popular")&lt;/P&gt;

&lt;P&gt;Expand Advanced settings -&amp;gt; New setting -&amp;gt; Name = KV_MODE Value = none (I can't attach another screenshot, sorry) -&amp;gt; Save&lt;/P&gt;

&lt;P&gt;This extracts the fields as you've specified for the line:&lt;/P&gt;

&lt;P&gt;&lt;CODE&gt;2018-01-07 01:50:39,296|INFO|ServiceName=xxxx|DropId=xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxx|JobNumber=(xxx)|DropNumber=(xxx)|StampCycle=xxxx|TotalFiles=xx|FileId=xxxxxxx-xxx-xxxx-xxxx-xxxxxxxxxxxxxxx|QueueName: xxx_xxxxx_xxxxxx, GUID: xxxxxx-xxxx-xxxx-xxxx-xxxxxxx&lt;/CODE&gt;&lt;/P&gt;

&lt;P&gt;including:&lt;/P&gt;

&lt;P&gt;FileId: xxxxxxx-xxx-xxxx-xxxx-xxxxxxxxxxxxxxx&lt;/P&gt;</description>
      <pubDate>Tue, 09 Jan 2018 21:56:33 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Field-Extractions-in-Search-Head-GUI/m-p/372642#M163980</guid>
      <dc:creator>micahkemp</dc:creator>
      <dc:date>2018-01-09T21:56:33Z</dc:date>
    </item>
  </channel>
</rss>

