Splunk Search

How to extract all vault in a one _raw data ?

Juns
Loves-to-Learn

Hi all:

          I'm a rookie user ask for help, I want to extract all vault in one _raw data(CLI command log as below photo),

          I want have Location,Card,Type,Mnemonic,Part Number,Serial Number,CLEI,Pmax(W),Imax(A) these fields all vault, can some one help me please, thank you very much.

 

splunk.jpg

Tags (1)
0 Karma

ITWhisperer
SplunkTrust
SplunkTrust

Rather than a picture, please provide your sample data as raw text in a code block (anonymised/obfuscated as necessary) to aid volunteers designing a solution for you.

Also, I assume from your description, this is all ingested as a single event. Does the event have a timestamp or does it take the ingestion time? Having extracted the fields, how do you want them displayed / reported on, e.g. all still in a single event or separate events for each location (and _time)?

0 Karma
Get Updates on the Splunk Community!

Upcoming Webinar: Unmasking Insider Threats with Slunk Enterprise Security’s UEBA

Join us on Wed, Dec 10. at 10AM PST / 1PM EST for a live webinar and demo with Splunk experts! Discover how ...

.conf25 technical session recap of Observability for Gen AI: Monitoring LLM ...

If you’re unfamiliar, .conf is Splunk’s premier event where the Splunk community, customers, partners, and ...

A Season of Skills: New Splunk Courses to Light Up Your Learning Journey

There’s something special about this time of year—maybe it’s the glow of the holidays, maybe it’s the ...