Splunk Search

How to remove a field from WMI search query results in Splunk?

anoopambli
Communicator

I have configured below query in wmi.conf

wql = select Caption,State from Win32_Service where Name like '%BlackBerry%'

Splunk is pulling up status of all Blackberry services correctly

8/11/14
11:48:57.079 AM

20140811114857.079470 Caption=BlackBerry Synchronization Service State=Running wmi_type=BlackBerryService

Only problem is when i table the output like | table host, Caption, State the result is coming up this way,
MCLCOVBB61VWIN BlackBerry Running

The service name is incomplete. What i found out was that, if i expand the fields in the original query, i see another field there with the name Caption which has only 'Blackberry' as the value.

How do i get rid of the second Caption field?

Tags (2)
1 Solution

somesoni2
Revered Legend

The reason you see incomplete value for Service Name/Caption fields is that there are multiple words in the value and its not enclosed within double qotes (and I don't think there is any options to enforce double quoted values from WMI queries), So workaround to this issue will by to extract full value for Caption fields.

This can be done at search query level like this

your base search | rex "Caption=(?<Caption>.*)(\r\n)"  | table host, Caption, State

OR

your base search | rex "Caption=(?<Caption>.*) State="  | table host, Caption, State

(see whichever works)

You can also, save the same regex as Search Time field extraction so that you don't have to write the regex in every search query.
http://docs.splunk.com/Documentation/Splunk/6.1.3/Knowledge/Addfieldsatsearchtime

View solution in original post

somesoni2
Revered Legend

The reason you see incomplete value for Service Name/Caption fields is that there are multiple words in the value and its not enclosed within double qotes (and I don't think there is any options to enforce double quoted values from WMI queries), So workaround to this issue will by to extract full value for Caption fields.

This can be done at search query level like this

your base search | rex "Caption=(?<Caption>.*)(\r\n)"  | table host, Caption, State

OR

your base search | rex "Caption=(?<Caption>.*) State="  | table host, Caption, State

(see whichever works)

You can also, save the same regex as Search Time field extraction so that you don't have to write the regex in every search query.
http://docs.splunk.com/Documentation/Splunk/6.1.3/Knowledge/Addfieldsatsearchtime

anoopambli
Communicator

That helped me. Thanks a ton.

0 Karma
Career Survey
First 500 qualified respondents will receive a $20 gift card! Tell us about your professional Splunk journey.
Get Updates on the Splunk Community!

Observe and Secure All Apps with Splunk

 Join Us for Our Next Tech Talk: Observe and Secure All Apps with SplunkAs organizations continue to innovate ...

What's New in Splunk Observability - August 2025

What's New We are excited to announce the latest enhancements to Splunk Observability Cloud as well as what is ...

Introduction to Splunk AI

How are you using AI in Splunk? Whether you see AI as a threat or opportunity, AI is here to stay. Lucky for ...