Splunk Search

How to extract the field "alert" with the field name action?

balu1211
Path Finder

Hi,

how to extract the field "alert" with the field name action.

help with the regex..

Thanks.

Labels (2)
0 Karma

yuanliu
SplunkTrust
SplunkTrust

@balu1211Have you tried my answer above? It creates key-value pairs, then extract them.

0 Karma

balu1211
Path Finder

@yuanliu

We have to create a new field name it's not the existing field.

Thanks..

0 Karma

balu1211
Path Finder

@ITWhisperer

@yuanliu

Could you please figure out the outputs of the above usecases.

Thanks

0 Karma

ITWhisperer
SplunkTrust
SplunkTrust
| rex "\"tag\":\"AKAMAI\/WAF\/(?<akamai_waf>[^\"]+)\""
0 Karma
Get Updates on the Splunk Community!

See just what you’ve been missing | Observability tracks at Splunk University

Looking to sharpen your observability skills so you can better understand how to collect and analyze data from ...

Weezer at .conf25? Say it ain’t so!

Hello Splunkers, The countdown to .conf25 is on-and we've just turned up the volume! We're thrilled to ...

How SC4S Makes Suricata Logs Ingestion Simple

Network security monitoring has become increasingly critical for organizations of all sizes. Splunk has ...