Splunk Search

How to consolidate values from 2 fields in my data into a new field?

bugnet
Path Finder

Hi all,

There is a way to consolidate two fields?
For example, I have the following event:

"CEF:0|IMPERVA|SecureSphere|9.0.0|Firewall: eventID=233215 act=none proto=tcp cs1=mozilla cs1lable=firefox"

The meaning of cs1 is = Custom string1

I want to consolidate the fields cs1=mozilla and cs1lable=firefox to a new field . for example: User-Agent=mozilla_firefox
And If it possible to set it globally.

???

10x

Tags (2)
0 Karma

stephanefotso
Motivator

First extract fields before the concatenation:

...|rex field=_raw "cs1\=(?<field1>\S)\s+cs1lable\=(?<field2>[^\n])"|eval user_agent=field1+"_"+field2|table user_agent
SGF
0 Karma

stephane_cyrill
Builder

Hi Bugnet, i hope what you want is a concatenation. if yes try this:

... | strcat cs1 "_" cs1lable User-Agent

doing so will give you the expected result if your fields cs1 and cs1lable are extracted fields

0 Karma
Get Updates on the Splunk Community!

Stay Connected: Your Guide to November Tech Talks, Office Hours, and Webinars!

What are Community Office Hours? Community Office Hours is an interactive 60-minute Zoom series where ...

Index This | When is October more than just the tenth month?

October 2025 Edition  Hayyy Splunk Education Enthusiasts and the Eternally Curious!   We’re back with this ...

Observe and Secure All Apps with Splunk

  Join Us for Our Next Tech Talk: Observe and Secure All Apps with SplunkAs organizations continue to innovate ...