Splunk Search

How to map certain extracted interesting fields to a name to use these fields in a data model?

jflaherty
Path Finder

Hello,

I have a couple of sources that Splunk is nicely automatically pulling the fields I need into the "Interesting Fields". One is active directory and other is a json. The problem is that I need to use these fields in a data model, but they are not named the same. Is there a way to map these fields to a name so I don't have to manually create an extraction for each? If not, is there anywhere I can see what regexes Splunk is using to extract the fields so I can make sure I get them right?

Thanks!

0 Karma
1 Solution

niketn
Legend

You can use Field Aliases knowledge Objects provided in Splunk. Refer to the following documentation:

http://docs.splunk.com/Documentation/Splunk/6.5.1/Knowledge/Addaliasestofields

____________________________________________
| makeresults | eval message= "Happy Splunking!!!"

View solution in original post

niketn
Legend

You can use Field Aliases knowledge Objects provided in Splunk. Refer to the following documentation:

http://docs.splunk.com/Documentation/Splunk/6.5.1/Knowledge/Addaliasestofields

____________________________________________
| makeresults | eval message= "Happy Splunking!!!"
Get Updates on the Splunk Community!

New in Observability Cloud - Explicit Bucket Histograms

Splunk introduces native support for histograms as a metric data type within Observability Cloud with Explicit ...

Updated Team Landing Page in Splunk Observability

We’re making some changes to the team landing page in Splunk Observability, based on your feedback. The ...

New! Splunk Observability Search Enhancements for Splunk APM Services/Traces and ...

Regardless of where you are in Splunk Observability, you can search for relevant APM targets including service ...