I am using Splunk to index logs with multiple fields with the same name. All fields have the same meaning: 2012-02-22 13:10:00,ip=127.0.0.1,[email protected],[email protected]
In the automatic extraction for this event, I only get "[email protected]" extracted for the "to" field. How can I make sure all the values are extracted?
Thanks!