<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Extract multiple values from a single field? in Splunk Search</title>
    <link>https://community.splunk.com/t5/Splunk-Search/Extract-multiple-values-from-a-single-field/m-p/158371#M44610</link>
    <description>&lt;P&gt;You can't use the Field Extractor to do this, but you can do it manually by editing props.conf. Field extraction happens at search time, so if you have a  search head, edit the props.conf there; otherwise, do it on the indexer(s). Here is what you need, more or less:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;[yoursourcetypehere]
EXTRACT-xyz1=Request Record\s*:\s*(?\&amp;lt;\S+?\&amp;gt;)
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;Given that you have redacted some data (understandably), my regular expressions may not be accurate. But you get the idea.&lt;/P&gt;

&lt;P&gt;Now, my solution assumes that each line beginning with INFO is a separate event, and I think that is the best. BUT if all of this data is indexed as a single event, take a look at this answer for&lt;BR /&gt;
information about &lt;A href="http://answers.splunk.com/answers/112311/multi-value-field-extraction.html"&gt;multi-valued field extraction&lt;/A&gt;&lt;/P&gt;

&lt;P&gt;Or see @KindaWorking's answer!&lt;/P&gt;</description>
    <pubDate>Mon, 23 Feb 2015 22:05:34 GMT</pubDate>
    <dc:creator>lguinn2</dc:creator>
    <dc:date>2015-02-23T22:05:34Z</dc:date>
    <item>
      <title>Extract multiple values from a single field?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Extract-multiple-values-from-a-single-field/m-p/158368#M44607</link>
      <description>&lt;P&gt;I'm trying to extract multiple values from a single field. I noticed that Splunk field extractor will only extract on value from each field, even if there are multiple values within that field. &lt;/P&gt;

&lt;P&gt;Field 1:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;INFO  2015-02-23 16:28:45,514  spatchMessageInspector fterReceiveRequest - Request Record : &amp;lt;CalculateTaxRequest&amp;gt;
&amp;lt;Redacted&amp;gt;
&amp;lt;Redacted&amp;gt;
INFO  2015-02-23 16:28:45,514  spatchMessageInspector fterReceiveResponse - Request Record : &amp;lt;CalculateTaxResponse&amp;gt;
&amp;lt;Redacted&amp;gt;
&amp;lt;Redacted&amp;gt;
INFO  2015-02-23 16:28:22,953  spatchMessageInspector fterReceiveRequest - Request Record :  &amp;lt;LookupTaxableAddressRequest
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;I am trying to extract 'CalculateTaxRequest', 'CalculateTaxResponse', and 'LookupTaxableAddress' but it will only extract the first value of 'CalculateTaxRequest' then go to the next field and only extract one value from it. &lt;/P&gt;</description>
      <pubDate>Mon, 23 Feb 2015 21:35:35 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Extract-multiple-values-from-a-single-field/m-p/158368#M44607</guid>
      <dc:creator>skoelpin</dc:creator>
      <dc:date>2015-02-23T21:35:35Z</dc:date>
    </item>
    <item>
      <title>Re: Extract multiple values from a single field?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Extract-multiple-values-from-a-single-field/m-p/158369#M44608</link>
      <description>&lt;P&gt;send me your regex or props /transforms.conf data&lt;/P&gt;</description>
      <pubDate>Mon, 23 Feb 2015 21:55:02 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Extract-multiple-values-from-a-single-field/m-p/158369#M44608</guid>
      <dc:creator>kml_uvce</dc:creator>
      <dc:date>2015-02-23T21:55:02Z</dc:date>
    </item>
    <item>
      <title>Re: Extract multiple values from a single field?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Extract-multiple-values-from-a-single-field/m-p/158370#M44609</link>
      <description>&lt;P&gt;WPreston helped me solve this in one of his comments here: &lt;A href="http://answers.splunk.com/answers/214368/how-to-extract-all-values-for-a-single-field-using.html"&gt;http://answers.splunk.com/answers/214368/how-to-extract-all-values-for-a-single-field-using.html&lt;/A&gt;&lt;/P&gt;

&lt;P&gt;A quick quote from him:&lt;/P&gt;

&lt;BLOCKQUOTE&gt;
&lt;P&gt;To extract multiple values of the same field from a single event, you need to add your extraction to transforms.conf and add MV_ADD = True, then either create a new report stanza or add to an existing report stanza in props.conf for the host, source, or sourcetype that the field is associated with. For this example, I'll use a sourcetype of 'waterfall':&lt;/P&gt;
&lt;/BLOCKQUOTE&gt;

&lt;P&gt;&lt;STRONG&gt;transforms.conf&lt;/STRONG&gt;&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;     [Security_ID_Extraction]
     REGEX = Security\sID:\s+(?&amp;lt;SecurityID&amp;gt;.*)\n

 MV_ADD = True
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;&lt;STRONG&gt;props.conf&lt;/STRONG&gt;&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt; [waterfall]
 REPORT-waterfall_fields = Security_ID_Extraction
&lt;/CODE&gt;&lt;/PRE&gt;</description>
      <pubDate>Mon, 23 Feb 2015 22:05:04 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Extract-multiple-values-from-a-single-field/m-p/158370#M44609</guid>
      <dc:creator>KindaWorking</dc:creator>
      <dc:date>2015-02-23T22:05:04Z</dc:date>
    </item>
    <item>
      <title>Re: Extract multiple values from a single field?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Extract-multiple-values-from-a-single-field/m-p/158371#M44610</link>
      <description>&lt;P&gt;You can't use the Field Extractor to do this, but you can do it manually by editing props.conf. Field extraction happens at search time, so if you have a  search head, edit the props.conf there; otherwise, do it on the indexer(s). Here is what you need, more or less:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;[yoursourcetypehere]
EXTRACT-xyz1=Request Record\s*:\s*(?\&amp;lt;\S+?\&amp;gt;)
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;Given that you have redacted some data (understandably), my regular expressions may not be accurate. But you get the idea.&lt;/P&gt;

&lt;P&gt;Now, my solution assumes that each line beginning with INFO is a separate event, and I think that is the best. BUT if all of this data is indexed as a single event, take a look at this answer for&lt;BR /&gt;
information about &lt;A href="http://answers.splunk.com/answers/112311/multi-value-field-extraction.html"&gt;multi-valued field extraction&lt;/A&gt;&lt;/P&gt;

&lt;P&gt;Or see @KindaWorking's answer!&lt;/P&gt;</description>
      <pubDate>Mon, 23 Feb 2015 22:05:34 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Extract-multiple-values-from-a-single-field/m-p/158371#M44610</guid>
      <dc:creator>lguinn2</dc:creator>
      <dc:date>2015-02-23T22:05:34Z</dc:date>
    </item>
  </channel>
</rss>

