Splunk Search

Split complex event to key value table

ormoush
Engager

Hi,

I'm trying to split this event into a

namevalue
FieldAfalse
FieldB5

key-value table

 

org.Data@28c839cfname=FieldA, value=false, org.Data@49b45b79name=FealedB, value=5,

 

Query: 

1. base_query |  extract pairdelim="  ", kvdelim=" " | table _raw
2. base_query |  extract pairdelim="org.data*=", kvdelim=" " | table _raw

is it possible?

Thanks

Labels (2)
0 Karma
1 Solution

ITWhisperer
SplunkTrust
SplunkTrust
| rex max_match=0 "org.Data[^=]+=(?<name>[^,]+),\svalue=(?<value>[^,]+)"
| eval fieldvalue=mvzip(name, value)
| fields fieldvalue
| mvexpand fieldvalue
| rex field=fieldvalue "(?<name>[^,]+),(?<value>.+)"
| table name, value

View solution in original post

ITWhisperer
SplunkTrust
SplunkTrust
| rex max_match=0 "org.Data[^=]+=(?<name>[^,]+),\svalue=(?<value>[^,]+)"
| eval fieldvalue=mvzip(name, value)
| fields fieldvalue
| mvexpand fieldvalue
| rex field=fieldvalue "(?<name>[^,]+),(?<value>.+)"
| table name, value
Get Updates on the Splunk Community!

Application management with Targeted Application Install for Victoria Experience

  Experience a new era of flexibility in managing your Splunk Cloud Platform apps! With Targeted Application ...

Index This | What goes up and never comes down?

January 2026 Edition  Hayyy Splunk Education Enthusiasts and the Eternally Curious!   We’re back with this ...

Splunkers, Pack Your Bags: Why Cisco Live EMEA is Your Next Big Destination

The Power of Two: Splunk &#43; Cisco at "Ludicrous Scale"   You know Splunk. You know Cisco. But have you seen ...