Splunk Search

Cut Fields of log data file

rafamss
Contributor

Hi guys,

I'll appreciate your help for my question. Well, I have a data file that has ten fields and I need cut only two and only two fields can be indexed. What do I do ?

Thanks!

Rafael Martins

0 Karma
1 Solution

kristian_kolb
Ultra Champion

Please provide some samples for more explicit help, but I think you could have a look here, where the process of selectively discarding parts of an event is described.

http://docs.splunk.com/Documentation/Splunk/6.0.1/Data/Anonymizedatausingconfigurationfiles

/k

View solution in original post

0 Karma

kristian_kolb
Ultra Champion

Please provide some samples for more explicit help, but I think you could have a look here, where the process of selectively discarding parts of an event is described.

http://docs.splunk.com/Documentation/Splunk/6.0.1/Data/Anonymizedatausingconfigurationfiles

/k

0 Karma
Get Updates on the Splunk Community!

Unleash the Power of Splunk MCP and AI, Meet Us at .Conf 2025, and Find Even More New ...

Splunk Lantern is a Splunk customer success center that provides advice from Splunk experts on valuable data ...

Observability Professionals: Build Resilience and Visibility with These .conf25 ...

  If you're focused on performance, availability, and full-stack visibility, the Observability track at ...

See just what you’ve been missing | Observability tracks at Splunk University

Looking to sharpen your observability skills so you can better understand how to collect and analyze data from ...