Do you have some custom extraction in this sourcetype that is preventing Splunk from automatically extract these fields? With the exception of a typo in your data sample (Filed_Type should be Field_...
See more...
Do you have some custom extraction in this sourcetype that is preventing Splunk from automatically extract these fields? With the exception of a typo in your data sample (Filed_Type should be Field_Type as the other rows), the following is an emulation | makeresults | eval data = split("Field-Type=F_Type_1,.....,Section=F_Type_1_Value
Field-Type=F_Type_2,.....,Section=F_Type_2_Value
Field-Type=F_Type_3,.....,Section=F_Type_3_Value", "
")
| mvexpand data
| rename data AS _raw
| extract
``` data emulation above ``` Note the extract is implied in most sourcetypes. Field_Type Section _raw _time F_Type_1 F_Type_1_Value Field-Type=F_Type_1,.....,Section=F_Type_1_Value 2024-02-13 16:15:12 F_Type_2 F_Type_2_Value Field-Type=F_Type_2,.....,Section=F_Type_2_Value 2024-02-13 16:15:12 F_Type_3 F_Type_3_Value Field-Type=F_Type_3,.....,Section=F_Type_3_Value 2024-02-13 16:15:12 Are you not getting fields Field_Type and Section (which in your illustration of desired results is just Field-Value)? There should be no regex needed. (Also, regex is not the best tool for this rigidly formatted data.) If you already get Field_Type and Section, the following will give you what you illustrated: | sort host _time
| rename Field_Type as Field-Type, Section as Field-Value
| table _time host Field-Type Field-Value