I have integrated some log in Splunk... Need to extract the fields The log has two different set of events Using the Regular expression i have tried to extract the field .. the Regular expression pick the field name and the value correctly on one set of events.. but for the another set of event the expected field name and value is not extracting properly..... Sample log: test="2",hi="hi",splunk="siem",best="you",Karma="sure",thank="you" test="2",hi="hi",field="keypair",splunk="siem",best="you",Karma="sure",thank="you" test="2",hi="hi",splunk="siem",best="you",Karma="sure",thank="you" test="2",hi="hi",splunk="siem",best="you",Karma="sure",thank="you" test="2",hi="hi",splunk="siem",best="you",Karma="sure",thank="you" test="2",hi="hi",splunk="siem",best="you",Karma="sure",thank="you" test="2",hi="hi",field="keypair",splunk="siem",best="you",Karma="sure",thank="you" test="2",hi="hi",field="keypair",splunk="siem",best="you",Karma="sure",thank="you" test="2",hi="hi",field="keypair",splunk="siem",best="you",Karma="sure",thank="you" test="2",hi="hi",field="keypair",splunk="siem",best="you",Karma="sure",thank="you" test="2",hi="hi",splunk="siem",best="you",Karma="sure",thank="you"
... View more