Splunk Search

How to consolidate values from 2 fields in my data into a new field?

bugnet
Path Finder

Hi all,

There is a way to consolidate two fields?
For example, I have the following event:

"CEF:0|IMPERVA|SecureSphere|9.0.0|Firewall: eventID=233215 act=none proto=tcp cs1=mozilla cs1lable=firefox"

The meaning of cs1 is = Custom string1

I want to consolidate the fields cs1=mozilla and cs1lable=firefox to a new field . for example: User-Agent=mozilla_firefox
And If it possible to set it globally.

???

10x

Tags (2)
0 Karma

stephanefotso
Motivator

First extract fields before the concatenation:

...|rex field=_raw "cs1\=(?<field1>\S)\s+cs1lable\=(?<field2>[^\n])"|eval user_agent=field1+"_"+field2|table user_agent
SGF
0 Karma

stephane_cyrill
Builder

Hi Bugnet, i hope what you want is a concatenation. if yes try this:

... | strcat cs1 "_" cs1lable User-Agent

doing so will give you the expected result if your fields cs1 and cs1lable are extracted fields

0 Karma
Get Updates on the Splunk Community!

Introducing the 2024 SplunkTrust!

Hello, Splunk Community! We are beyond thrilled to announce our newest group of SplunkTrust members!  The ...

Introducing the 2024 Splunk MVPs!

We are excited to announce the 2024 cohort of the Splunk MVP program. Splunk MVPs are passionate members of ...

Splunk Custom Visualizations App End of Life

The Splunk Custom Visualizations apps End of Life for SimpleXML will reach end of support on Dec 21, 2024, ...