Splunk Search

Field extraction on events with more than 20 lines

Linze99
Explorer

Hi,

I have events that have more than 20 lines of data. In the Field extraction menu only the first 20 lines are shown. This prohibits me from extracting fields that are beyond the 20th line. Is there a way to show more lines? Can I get the required fileds in another way? My fields all have the same format like: $_NAME: VALUE. There are about 1200 different values in one event. Can I auto extract all fields from my events? (they all have the same sourcetype)

Labels (1)
0 Karma

isoutamo
SplunkTrust
SplunkTrust

Hi

IMHO it's much better to use e.g. https://regex101.com to other similar to define field extractions. Then just add those via conf files or gui. Splunk's own Field extraction menu don't do really good regex patterns if/when you have any complicated pattern to apply.

r. Ismo

0 Karma

vhharanpositka
Path Finder

Hi @Linze99 

 

You can use the "delimiter" (colon) for the field extraction process.

0 Karma
Get Updates on the Splunk Community!

Splunk Mobile: Your Brand-New Home Screen

Meet Your New Mobile Hub  Hello Splunk Community!  Staying connected to your data—no matter where you are—is ...

Introducing Value Insights (Beta): Understand the Business Impact your organization ...

Real progress on your strategic priorities starts with knowing the business outcomes your teams are delivering ...

Enterprise Security (ES) Essentials 8.3 is Now GA — Smarter Detections, Faster ...

As of today, Enterprise Security (ES) Essentials 8.3 is now generally available, helping SOC teams simplify ...