Splunk Search

Field extraction on events with more than 20 lines

Linze99
Explorer

Hi,

I have events that have more than 20 lines of data. In the Field extraction menu only the first 20 lines are shown. This prohibits me from extracting fields that are beyond the 20th line. Is there a way to show more lines? Can I get the required fileds in another way? My fields all have the same format like: $_NAME: VALUE. There are about 1200 different values in one event. Can I auto extract all fields from my events? (they all have the same sourcetype)

Labels (1)
0 Karma

isoutamo
SplunkTrust
SplunkTrust

Hi

IMHO it's much better to use e.g. https://regex101.com to other similar to define field extractions. Then just add those via conf files or gui. Splunk's own Field extraction menu don't do really good regex patterns if/when you have any complicated pattern to apply.

r. Ismo

0 Karma

vhharanpositka
Path Finder

Hi @Linze99 

 

You can use the "delimiter" (colon) for the field extraction process.

0 Karma
Get Updates on the Splunk Community!

Splunk Observability as Code: From Zero to Dashboard

For the details on what Self-Service Observability and Observability as Code is, we have some awesome content ...

[Puzzles] Solve, Learn, Repeat: Character substitutions with Regular Expressions

This challenge was first posted on Slack #puzzles channelFor BORE at .conf23, we had a puzzle question which ...

Shape the Future of Splunk: Join the Product Research Lab!

Join the Splunk Product Research Lab and connect with us in the Slack channel #product-research-lab to get ...