Splunk Search

How to extract all vault in a one _raw data ?

Juns
Loves-to-Learn

Hi all:

          I'm a rookie user ask for help, I want to extract all vault in one _raw data(CLI command log as below photo),

          I want have Location,Card,Type,Mnemonic,Part Number,Serial Number,CLEI,Pmax(W),Imax(A) these fields all vault, can some one help me please, thank you very much.

 

splunk.jpg

Tags (1)
0 Karma

ITWhisperer
SplunkTrust
SplunkTrust

Rather than a picture, please provide your sample data as raw text in a code block (anonymised/obfuscated as necessary) to aid volunteers designing a solution for you.

Also, I assume from your description, this is all ingested as a single event. Does the event have a timestamp or does it take the ingestion time? Having extracted the fields, how do you want them displayed / reported on, e.g. all still in a single event or separate events for each location (and _time)?

0 Karma
Get Updates on the Splunk Community!

Accelerating Observability as Code with the Splunk AI Assistant

We’ve seen in previous posts what Observability as Code (OaC) is and how it’s now essential for managing ...

Integrating Splunk Search API and Quarto to Create Reproducible Investigation ...

 Splunk is More Than Just the Web Console For Digital Forensics and Incident Response (DFIR) practitioners, ...

Congratulations to the 2025-2026 SplunkTrust!

Hello, Splunk Community! We are beyond thrilled to announce our newest group of SplunkTrust members!  The ...