Splunk Search

Trying to exclude a specific value from an extracted field

srinivas_gowda
Path Finder

Hello all,

 

I am trying to exclude an specific value within a field while retaining others. Can you please let me know.

 

Eg values:

1) /Server/Cpu/load/Login

2) /Server/Memory/usage

3)/Load/usage/value

 

These above are the values extracted form the event and I will have to remove only /Server value from the field while retaining all other values from the event.

Expected values needed:

1) /Cpu/load/Login

2) /Memory/usage

3) /Load/usage/value

 

Please help in getting this.

 

Labels (4)
0 Karma

ITWhisperer
SplunkTrust
SplunkTrust

where field is the name of the field you want the replacement done

| eval field=replace(field,"\/Server","")
0 Karma

skramp
SplunkTrust
SplunkTrust

You can do it by replace command:

| replace "/Server*" with "*"

0 Karma
Get Updates on the Splunk Community!

Monitoring Postgres with OpenTelemetry

Behind every business-critical application, you’ll find databases. These behind-the-scenes stores power ...

Mastering Synthetic Browser Testing: Pro Tips to Keep Your Web App Running Smoothly

To start, if you're new to synthetic monitoring, I recommend exploring this synthetic monitoring overview. In ...

Splunk Edge Processor | Popular Use Cases to Get Started with Edge Processor

Splunk Edge Processor offers more efficient, flexible data transformation – helping you reduce noise, control ...