The field extractor, when successful, adds that new field to Splunk settings, rather than just this one search. Meaning, only one is allowed at a time.
If you want to extract fields just from one search, rather than changing all of your Splunk searches, you'll be needing to extract it in the search string itself. This involves the rex command, and learning some regular expression programing.
So it might involve something like:
| rex (Document\sowned\sby\s)(?<owner>[\w?\d?]+)\s
to get the field for the owner. A fun way to learn more about regex is at this site: https://regexone.com
Or, if you don't care to learn regular expressions, you can take the Field Extractor to the point where it has figured out the extraction, and just copy it out of the "Show regex" area, and not save the extraction.
... View more