Hello Splunkers,
I am trying to configure a sourcetype in Advanced section.
For example, I create a field alias by creating the key/value:
When I perform search on the data, I see both MD5 and md5 fields to be extracted and containing the same values.
However, I want to see only md5 in Interesting fields.
Why do I see both fields?
Thank you in advance!
Afroditi
Hey @atemourt
Field aliases are an alternate name that you assign to a field allowing you to use that name to search for events that contain that field. A field can have multiple aliases, but a single alias can only apply to one field. For example, the field vendor_action
can be aliased to action
or message_type
, but not both. An alias does not replace or remove the original field name.
So whatever you see on the Splunk UI is correct. You are creating an alias, not field so do not worry.
have a look at this field alias documentation:
https://docs.splunk.com/Documentation/Splunk/7.1.2/Knowledge/Addaliasestofields
let me know if this helps!
Hey @atemourt
Field aliases are an alternate name that you assign to a field allowing you to use that name to search for events that contain that field. A field can have multiple aliases, but a single alias can only apply to one field. For example, the field vendor_action
can be aliased to action
or message_type
, but not both. An alias does not replace or remove the original field name.
So whatever you see on the Splunk UI is correct. You are creating an alias, not field so do not worry.
have a look at this field alias documentation:
https://docs.splunk.com/Documentation/Splunk/7.1.2/Knowledge/Addaliasestofields
let me know if this helps!
Hello mayurr98,
Thank you very much for your reply!