Splunk Search

Replace '&' with ','

Jananee_iNautix
Path Finder

I want to replace the character '&' with the character ',' in the below field.

field = {call DB2GIPS.GIP_IP_SMRY_BROWSE(?& ?& ?& ?& ?& ?)},4,145.20738080143929,65.47478818893433,360.34633181989193,580.8295232057571,,2.2596316800361542E-4,,0.0

so that the result should be

field = {call DB2GIPS.GIP_IP_SMRY_BROWSE(?, ?, ?, ?, ?, ?)},4,145.20738080143929,65.47478818893433,360.34633181989193,580.8295232057571,,2.2596316800361542E-4,,0.0

How can that be done in splunk?Please advice.

Tags (1)
0 Karma

chimell
Motivator
Hi 
Try this request :
      enter something here |field = {call DB2GIPS.GIP_IP_SMRY_BROWSE(?& ?& ?& ?& ?& ?)},4,145.20738080143929,65.47478818893433,360.34633181989193,580.8295232057571,,2.2596316800361542E-4,,0.0 | replace "(?& ?& ?& ?& ?& ?) "  with "(?, ?, ?, ?, ?, ?)" in field
0 Karma

David
Splunk Employee
Splunk Employee

Easily:

rex mode=sed "s/&/,/g"

Does that work for you?

ramdaspr
Contributor

you also should specify the field name you want to rex or it might mangle up the rest of the raw data as well..
so rex field=myfieldname mode=sed "s/&/,/g"

Get Updates on the Splunk Community!

App Platform's 2025 Year in Review: A Year of Innovation, Growth, and Community

As we step into 2026, it’s the perfect moment to reflect on what an extraordinary year 2025 was for the Splunk ...

Operationalizing Entity Risk Score with Enterprise Security 8.3+

Overview Enterprise Security 8.3 introduces a powerful new feature called “Entity Risk Scoring” (ERS) for ...

Unlock Database Monitoring with Splunk Observability Cloud

  In today’s fast-paced digital landscape, even minor database slowdowns can disrupt user experiences and ...