Splunk Search

How to map certain extracted interesting fields to a name to use these fields in a data model?

jflaherty
Path Finder

Hello,

I have a couple of sources that Splunk is nicely automatically pulling the fields I need into the "Interesting Fields". One is active directory and other is a json. The problem is that I need to use these fields in a data model, but they are not named the same. Is there a way to map these fields to a name so I don't have to manually create an extraction for each? If not, is there anywhere I can see what regexes Splunk is using to extract the fields so I can make sure I get them right?

Thanks!

0 Karma
1 Solution

niketn
Legend

You can use Field Aliases knowledge Objects provided in Splunk. Refer to the following documentation:

http://docs.splunk.com/Documentation/Splunk/6.5.1/Knowledge/Addaliasestofields

____________________________________________
| makeresults | eval message= "Happy Splunking!!!"

View solution in original post

niketn
Legend

You can use Field Aliases knowledge Objects provided in Splunk. Refer to the following documentation:

http://docs.splunk.com/Documentation/Splunk/6.5.1/Knowledge/Addaliasestofields

____________________________________________
| makeresults | eval message= "Happy Splunking!!!"
Get Updates on the Splunk Community!

Accelerating Observability as Code with the Splunk AI Assistant

We’ve seen in previous posts what Observability as Code (OaC) is and how it’s now essential for managing ...

Integrating Splunk Search API and Quarto to Create Reproducible Investigation ...

 Splunk is More Than Just the Web Console For Digital Forensics and Incident Response (DFIR) practitioners, ...

Congratulations to the 2025-2026 SplunkTrust!

Hello, Splunk Community! We are beyond thrilled to announce our newest group of SplunkTrust members!  The ...