Dashboards & Visualizations

Rename label chart

jip31jip31
Explorer

hi

in my request, i have a sourcename like this
Microsoft Office 15(count: 1, percent: 50.0)
i want to delete : could you tell me how to do please : regex, HTML code?
thanks

Tags (1)
0 Karma

jip31
Motivator

thanks!!!!!!!

0 Karma

niketn
Legend

@jip31jip31, what is the field name? is it really source or sourcename like you have mentioned in your question?

Also do you want to make this correction during index time or search time?

If you want it during search time following is run anywhere search based on sample data provided in the question:

|  makeresults
|  eval sourcename="Microsoft Office 15(count: 1, percent: 50.0)"
|  eval sourcename=replace(sourcename,":","")
____________________________________________
| makeresults | eval message= "Happy Splunking!!!"
0 Karma

niketn
Legend

@jip31 @jip31jip31 I have converted my comment to answer. If your issue is resolved please accept the answer to mark this question as answered!

____________________________________________
| makeresults | eval message= "Happy Splunking!!!"
0 Karma

jip31jip31
Explorer

nobody for helping me please???

0 Karma

jip31jip31
Explorer

Sorry but ko again....

0 Karma

krishnab
Path Finder

try this

|table sourcename|eval sourcename=replace(sourcename,":","")

0 Karma

jip31jip31
Explorer

SORRY IT DOESN T WORK

0 Karma

p_gurav
Champion

Can you try something:

 | rex field=sourcename mode=sed "s/://g"
0 Karma
Get Updates on the Splunk Community!

More Ways To Control Your Costs With Archived Metrics | Register for Tech Talk

Tuesday, May 14, 2024  |  11AM PT / 2PM ET Register to Attend Join us for this Tech Talk and learn how to ...

.conf24 | Personalize your .conf experience with Learning Paths!

Personalize your .conf24 Experience Learning paths allow you to level up your skill sets and dive deeper ...

Threat Hunting Unlocked: How to Uplevel Your Threat Hunting With the PEAK Framework ...

WATCH NOWAs AI starts tackling low level alerts, it's more critical than ever to uplevel your threat hunting ...