Splunk Search

How to extract the new field into interesting field from raw event?

Nagalakshmi
Path Finder

Hi Team,

we are trying to add new field  as a display name into interesting field from below raw event




DisplayName: sample-Hostname

We tried the below query but it is not working 

| rex field=_raw \"DisplayName", "Value":\s(?<DisplayName>\w+).

And also please suggest us how to create a query if the user logged in one or more devices.

Thanks in advance!

Labels (2)
Tags (1)
0 Karma
1 Solution

gcusello
SplunkTrust
SplunkTrust

Hi @Nagalakshmi ,

good for you, see next time!

let me know if I can help you more, or, please, accept one answer for the other people of Community.

Ciao and happy splunking

Giuseppe

P.S.: Karma Points are appreciated 😉

View solution in original post

Nagalakshmi
Path Finder

Hi @gcusello ,

Thanks for the quick response!

The above query is perfectly working


0 Karma

gcusello
SplunkTrust
SplunkTrust

Hi @Nagalakshmi ,

good for you, see next time!

let me know if I can help you more, or, please, accept one answer for the other people of Community.

Ciao and happy splunking

Giuseppe

P.S.: Karma Points are appreciated 😉

gcusello
SplunkTrust
SplunkTrust

Hi @Nagalakshmi ,

this seems to be a json log, so you can extract all fields using the "INDEXED_EXTRACTION = json" in the props.conf or using the "spath" command.

If you want to use a regex, you can use:

| rex "DisplayName\",\s+\"Value\":\s+\"(?<DisplayName>[^\"]+)"

that you can test at https://regex101.com/r/hjQXGU/1

Ciao.

Giuseppe

0 Karma
Get Updates on the Splunk Community!

Preparing your Splunk Environment for OpenSSL3

The Splunk platform will transition to OpenSSL version 3 in a future release. Actions are required to prepare ...

Unleash Unified Security and Observability with Splunk Cloud Platform

     Now Available on Microsoft AzureThursday, March 27, 2025  |  11AM PST / 2PM EST | Register NowStep boldly ...

Splunk AppDynamics with Cisco Secure Application

Web applications unfortunately present a target rich environment for security vulnerabilities and attacks. ...