Splunk Search

How to develop a table based on my CSV log format?

balleste
Engager

I have the following log format and I'm trying to create a table that will have the following format:

"Device","Object","Value" "mail01","Analyzed attachment count","100 #" "mail02","Analyzed attachment count","3 #" "mail03","Analyzed attachment count","300 #" "mail04","Analyzed attachment count","25 #" "mail05","Analyzed attachment count","1000 #"

|Device | Object | Value |
|mail01 | Analyzed attachment count | 100 |
|mail02 | Analyzed attachment count | 3 |
|mail03 | Analyzed attachment count | 300 |
|mail04 | Analyzed attachment count | 25 |
|mail05 | Analyzed attachment count | 1000 |

Any ideas?

0 Karma

somesoni2
Revered Legend

Try like this

your base search to select that event | rex max_match=0 "\"(?<Device>[^\"]+)\",\"(?<Object>[^\"]+)\",\"(?<Value>\d+)\s+#\"" | eval temp=mvzip(mvzip(Device,Object,"#"),"#")  | mvexpand temp | rex field=temp "(?<Device>.+)#(?<Object>.+)#(?<Value>\d+)" | table Device Object Value

balleste
Engager

Thanks for the response...I ran it but I get an error with the eval command stating that the arguments of the mvzip command is invalid.

0 Karma
Get Updates on the Splunk Community!

The OpenTelemetry Certified Associate (OTCA) Exam

What’s this OTCA exam? The Linux Foundation offers the OpenTelemetry Certified Associate (OTCA) credential to ...

From Manual to Agentic: Level Up Your SOC at Cisco Live

Welcome to the Era of the Agentic SOC   Are you tired of being a manual alert responder? The security ...

Splunk Classroom Chronicles: Training Tales and Testimonials (Episode 4)

Welcome back to Splunk Classroom Chronicles, our ongoing series where we shine a light on what really happens ...