Sending events with dynamic number of fields to Splunk (array)

How do I dynamically create multi value fields in Cribl?
For example, I would like to take the following and send it as a multi value event in Splunk:


For example, this sample event can come in with anywhere from 1 to 50 different MAC addresses.

1 UpGoat

This can be accomplished by using the Eval function

with an Evaluate Fields to create a field named cs19 using the Value Expression cs19.split(';')

This will create an array called cs19, and for your example, it contains 33 values.

Send this over to Splunk as per usual, and it should come out as an index-time multi-valued field.

:slightly_smiling_face: to Dritan for this answer!

1 UpGoat