Getting Data In

How to extract csv files with common fields in the header?

VatsalJagani
SplunkTrust
SplunkTrust

Below is my CSV file format.

 

 

Time Span:,Full Time-span
Rate:,Cumulative
Scope:,Net
This is Table Header
Field1,Field2,Field3,Field4
Total1,/,1.20%,2.34%,N/A
Total2,/Total2,1.20%,2.05%,N/A
Total3,/Total/Total3,1.20%,N/A,N/A
Effect4,/Total/Total4,0.00%,N/A,N/A

 

  • Here first 3 lines are common fields and values.
  • 4th line is the table header (willing to extract that as a field as well if possible)
  • The rest is the actual CSV file, I would like to extract it as field value pairs.

 

Labels (3)
0 Karma
1 Solution

richgalloway
SplunkTrust
SplunkTrust

To do that you'll have to write a scripted input that parses the CSV and copies the common fields to each line in the file.

---
If this reply helps you, Karma would be appreciated.

View solution in original post

0 Karma

richgalloway
SplunkTrust
SplunkTrust

What have you tried so far?  Have you tried something like this in props.conf?

[mysourcetype]
INDEXED_EXTRACTIONS = csv
HEADER_FIELD_LINE_NUMBER = 4
DATETIME_CONFIG = current
---
If this reply helps you, Karma would be appreciated.

VatsalJagani
SplunkTrust
SplunkTrust

@richgalloway - This is helpful. Thanks!!!

But I would like to include common fields from the header to all the events, not sure if that is possible.

 

0 Karma

richgalloway
SplunkTrust
SplunkTrust

To do that you'll have to write a scripted input that parses the CSV and copies the common fields to each line in the file.

---
If this reply helps you, Karma would be appreciated.
0 Karma

VatsalJagani
SplunkTrust
SplunkTrust

Yes, Python script is always an option, but I was wondering if it is possible without that. Something like KV_MODE=multi

0 Karma

richgalloway
SplunkTrust
SplunkTrust

There is no setting that does what you desire.  KV_MODE = multi extracts fields from table-formatted data.

---
If this reply helps you, Karma would be appreciated.
0 Karma
Get Updates on the Splunk Community!

Leveraging Detections from the Splunk Threat Research Team & Cisco Talos

  Now On Demand  Stay ahead of today’s evolving threats with the combined power of the Splunk Threat Research ...

New in Splunk Observability Cloud: Automated Archiving for Unused Metrics

Automated Archival is a new capability within Metrics Management; which is a robust usage & cost optimization ...

Calling All Security Pros: Ready to Race Through Boston?

Hey Splunkers, .conf25 is heading to Boston and we’re kicking things off with something bold, competitive, and ...