Splunk Search

extract fields from a sentence

newbiesplunk
Path Finder

Hi,
I had the following sentence and wish to extract fields as follows:

event Row: 1234, tp1, 314242, 1, 2014-09-27 12:00:19.0, track, 55444, test

Below is the fields to extract from the above event.

Key      Value
S_ID     1234
type     tp1
B_ID     314242
mode   1
B_date  2014-09-27 12:00:19.0
name    track
c_ID      55444
c_name test

How to go abt extracting the fields in the most simplest way? thks

Tags (1)
0 Karma

kristian_kolb
Ultra Champion

Do it in the form of a REPORT in props/transforms.

props.conf

[your_sourcetype]
REPORT-blah = get_my_fields

transforms.conf

[get_my_fields]
DELIMS = ","
FIELDS = S_ID, type, B_ID, mode, B_date, name, c_ID, c_name

/K

0 Karma

somesoni2
Revered Legend

Try this

Your base search | rex "(?<S_ID>.*),(?<type>.*),(?<B_ID>.*),(?<mode>.*),(?<B_date>.*),(?<name>.*),(?<C_ID>.*),(?<C_name>.*)"
0 Karma
Get Updates on the Splunk Community!

Building Reliable Asset and Identity Frameworks in Splunk ES

 Accurate asset and identity resolution is the backbone of security operations. Without it, alerts are ...

Cloud Monitoring Console - Unlocking Greater Visibility in SVC Usage Reporting

For Splunk Cloud customers, understanding and optimizing Splunk Virtual Compute (SVC) usage and resource ...

Automatic Discovery Part 3: Practical Use Cases

If you’ve enabled Automatic Discovery in your install of the Splunk Distribution of the OpenTelemetry ...