I am trying to save this search below as a field for my user to be able to see on their "selected fields" during their new search and be able to click on it to see the pre-created reports.
I've read the Splunk Answers post about "Save an 'eval'-based field extraction" which points me to setting up a macro.... I would like to know if this is the best route or is there different advice for handling this.... maybe reworking my thinking all together.
index=test1 | transaction session_id | eval user_agent_string_decoded=urldecode(user_agent_string_encoded)
1)The logged event:
2) I capture this into the field useragentstring_encoded)
3) I decode it using the above search string
Setting up a macro is fine if you dont need to do the decoding every time you search. You can use the macro as needed.
If you wanted this decoding to happen automatically every time someone searches that sourcetype you can add this to your props.conf on your search head. You should be able to apply the setting with out restartng by loading the debug/refresh endpoint on your search head
[theSourceType] EVAL-user_agent_string_decoded = urldecode(user_agent_string_encoded)
I was working to this direction right after I asked the question. Your comment helped me validate my direction.