Splunk Search

Split complex event to key value table

ormoush
Engager

Hi,

I'm trying to split this event into a

namevalue
FieldAfalse
FieldB5

key-value table

 

org.Data@28c839cfname=FieldA, value=false, org.Data@49b45b79name=FealedB, value=5,

 

Query: 

1. base_query |  extract pairdelim="  ", kvdelim=" " | table _raw
2. base_query |  extract pairdelim="org.data*=", kvdelim=" " | table _raw

is it possible?

Thanks

Labels (2)
0 Karma
1 Solution

ITWhisperer
SplunkTrust
SplunkTrust
| rex max_match=0 "org.Data[^=]+=(?<name>[^,]+),\svalue=(?<value>[^,]+)"
| eval fieldvalue=mvzip(name, value)
| fields fieldvalue
| mvexpand fieldvalue
| rex field=fieldvalue "(?<name>[^,]+),(?<value>.+)"
| table name, value

View solution in original post

ITWhisperer
SplunkTrust
SplunkTrust
| rex max_match=0 "org.Data[^=]+=(?<name>[^,]+),\svalue=(?<value>[^,]+)"
| eval fieldvalue=mvzip(name, value)
| fields fieldvalue
| mvexpand fieldvalue
| rex field=fieldvalue "(?<name>[^,]+),(?<value>.+)"
| table name, value
Get Updates on the Splunk Community!

AI for AppInspect

We’re excited to announce two new updates to AppInspect designed to save you time and make the app approval ...

App Platform's 2025 Year in Review: A Year of Innovation, Growth, and Community

As we step into 2026, it’s the perfect moment to reflect on what an extraordinary year 2025 was for the Splunk ...

Operationalizing Entity Risk Score with Enterprise Security 8.3+

Overview Enterprise Security 8.3 introduces a powerful new feature called “Entity Risk Scoring” (ERS) for ...