Splunk Search

How can I remove excess characters from my fields?

AKG1_old1
Builder

Hi,

In my log file one field called Script Name contains some unnecessary details, which I want to remove.

My requirement is to remove "qcst_" ".sh" and all others arguments like "-LS" "/hp267srv/apps/MXTEST" etc

Actual Data:

qcst_mxStEnvLoad.sh
qcst_ZipLastRun.sh Order_Simulation /hp267srv/apps/MXTEST /net/hp267srv/hp267srv/apps/MXTEST Order_Simulation
qcst_runningProcessesDetails.sh -LS

Expected:

mxStEnvLoad
ZipLastRun
runningProcessesDetails

Thanks
Ankit

0 Karma
1 Solution

sbbadri
Motivator

try this

.... | rex field=_raw "qcst_(?P<field1>\S+).sh"

View solution in original post

alemarzu
Motivator

Hi there @agoyal

Assuming that you already have a field that contains those values (ie, command) you can create a new field from it with the new values, like this.

base search | rex field="command" "^\S+_(?<trimmed_command>[^\.]+)\.\S+"

Hope it helps.

sbbadri
Motivator

try this

.... | rex field=_raw "qcst_(?P<field1>\S+).sh"

Get Updates on the Splunk Community!

Index This | When is October more than just the tenth month?

October 2025 Edition  Hayyy Splunk Education Enthusiasts and the Eternally Curious!   We’re back with this ...

Observe and Secure All Apps with Splunk

  Join Us for Our Next Tech Talk: Observe and Secure All Apps with SplunkAs organizations continue to innovate ...

What’s New & Next in Splunk SOAR

 Security teams today are dealing with more alerts, more tools, and more pressure than ever.  Join us for an ...