Splunk Search

Field extraction on events with more than 20 lines

Linze99
Explorer

Hi,

I have events that have more than 20 lines of data. In the Field extraction menu only the first 20 lines are shown. This prohibits me from extracting fields that are beyond the 20th line. Is there a way to show more lines? Can I get the required fileds in another way? My fields all have the same format like: $_NAME: VALUE. There are about 1200 different values in one event. Can I auto extract all fields from my events? (they all have the same sourcetype)

Labels (1)
0 Karma

isoutamo
SplunkTrust
SplunkTrust

Hi

IMHO it's much better to use e.g. https://regex101.com to other similar to define field extractions. Then just add those via conf files or gui. Splunk's own Field extraction menu don't do really good regex patterns if/when you have any complicated pattern to apply.

r. Ismo

0 Karma

vhharanpositka
Path Finder

Hi @Linze99 

 

You can use the "delimiter" (colon) for the field extraction process.

0 Karma
Get Updates on the Splunk Community!

What the End of Support for Splunk Add-on Builder Means for You

Hello Splunk Community! We want to share an important update regarding the future of the Splunk Add-on Builder ...

Solve, Learn, Repeat: New Puzzle Channel Now Live

Welcome to the Splunk Puzzle PlaygroundIf you are anything like me, you love to solve problems, and what ...

Building Reliable Asset and Identity Frameworks in Splunk ES

 Accurate asset and identity resolution is the backbone of security operations. Without it, alerts are ...