Splunk Search

Trying to exclude a specific value from an extracted field

srinivas_gowda
Path Finder

Hello all,

 

I am trying to exclude an specific value within a field while retaining others. Can you please let me know.

 

Eg values:

1) /Server/Cpu/load/Login

2) /Server/Memory/usage

3)/Load/usage/value

 

These above are the values extracted form the event and I will have to remove only /Server value from the field while retaining all other values from the event.

Expected values needed:

1) /Cpu/load/Login

2) /Memory/usage

3) /Load/usage/value

 

Please help in getting this.

 

Labels (4)
0 Karma

ITWhisperer
SplunkTrust
SplunkTrust

where field is the name of the field you want the replacement done

| eval field=replace(field,"\/Server","")
0 Karma

skramp
SplunkTrust
SplunkTrust

You can do it by replace command:

| replace "/Server*" with "*"

0 Karma
Get Updates on the Splunk Community!

Splunk Enterprise Security 8.0.2 Availability: On cloud and On-premise!

A few months ago, we released Splunk Enterprise Security 8.0 for our cloud customers. Today, we are excited to ...

Logs to Metrics

Logs and Metrics Logs are generally unstructured text or structured events emitted by applications and written ...

Developer Spotlight with Paul Stout

Welcome to our very first developer spotlight release series where we'll feature some awesome Splunk ...