<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: splunk concatenate field in table in Splunk Search</title>
    <link>https://community.splunk.com/t5/Splunk-Search/splunk-concatenate-field-in-table/m-p/520790#M146712</link>
    <description>&lt;P&gt;What is the field name that you have extracted the MID into?&lt;/P&gt;</description>
    <pubDate>Tue, 22 Sep 2020 10:46:09 GMT</pubDate>
    <dc:creator>ITWhisperer</dc:creator>
    <dc:date>2020-09-22T10:46:09Z</dc:date>
    <item>
      <title>splunk concatenate field in table</title>
      <link>https://community.splunk.com/t5/Splunk-Search/splunk-concatenate-field-in-table/m-p/520772#M146703</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;As newcomer to splunk , i have the following ironport log :&lt;/P&gt;&lt;P&gt;&amp;lt;38&amp;gt;Sep 22 02:15:35 mail_logs: Info: Message finished MID 3035876 done&lt;BR /&gt;&amp;lt;38&amp;gt;Sep 22 02:15:35 mail_logs: Info: MID 3035876 quarantined to "Virus" (a/v verdict:VIRAL)&lt;BR /&gt;&amp;lt;38&amp;gt;Sep 22 02:15:34 mail_logs: Info: MID 3035877 was generated based on MID 3035876 by antivirus&lt;BR /&gt;&amp;lt;38&amp;gt;Sep 22 02:15:32 mail_logs: Info: MID 3035876 attachment 'Revised=20Order.doc'&lt;BR /&gt;&amp;lt;38&amp;gt;Sep 22 02:15:32 mail_logs: Info: MID 3035876 antivirus positive 'CXmail/RtfObf-D'&lt;BR /&gt;&amp;lt;38&amp;gt;Sep 22 02:15:32 mail_logs: Info: MID 3035876 interim AV verdict using Sophos VIRAL&lt;BR /&gt;&amp;lt;38&amp;gt;Sep 22 02:15:32 mail_logs: Info: MID 3035876 was too big (1456210/1048576) for scanning by CASE&lt;BR /&gt;&amp;lt;38&amp;gt;Sep 22 02:15:32 mail_logs: Info: MID 3035876 matched all recipients for per-recipient policy DEFAULT in the inbound table&lt;BR /&gt;&amp;lt;38&amp;gt;Sep 22 02:15:31 mail_logs: Info: MID 3035876 ready 1456210 bytes from &amp;lt;vivek.sood@swiftsecuritas.in&amp;gt;&lt;BR /&gt;&amp;lt;38&amp;gt;Sep 22 02:15:31 mail_logs: Info: MID 3035876 Subject 'Revised Order 21-09-20'&lt;BR /&gt;&amp;lt;38&amp;gt;Sep 22 02:15:31 mail_logs: Info: MID 3035876 Message-ID '&amp;lt;2132122449.43046.1600730091044.JavaMail.zimbra@swiftsecuritas.in&amp;gt;'&lt;BR /&gt;&amp;lt;38&amp;gt;Sep 22 02:15:31 mail_logs: Info: MID 3035876 DMARC: Verification passed&lt;BR /&gt;&amp;lt;38&amp;gt;Sep 22 02:15:31 mail_logs: Info: MID 3035876 DMARC: Message from domain swiftsecuritas.in, DMARC pass (SPF aligned True, DKIM aligned True)&lt;BR /&gt;&amp;lt;38&amp;gt;Sep 22 02:15:31 mail_logs: Info: MID 3035876 DKIM: pass signature verified (d=swiftsecuritas.in s=73FEA6D0-E5D5-11EA-A7BE-617208D79BCE i=@swiftsecuritas.in)&lt;BR /&gt;&amp;lt;38&amp;gt;Sep 22 02:15:13 mail_logs: Info: MID 3035876 SPF: mailfrom identity vivek.sood@swiftsecuritas.in Pass (v=spf1)&lt;BR /&gt;&amp;lt;38&amp;gt;Sep 22 02:15:11 mail_logs: Info: MID 3035876 SPF: helo identity postmaster@mx.gulshanindia.com None&lt;BR /&gt;&amp;lt;38&amp;gt;Sep 22 02:15:11 mail_logs: Info: MID 3035876 ICID 1856276 RID 0 To: &amp;lt;info@mycompany.com&amp;gt;&lt;BR /&gt;&amp;lt;38&amp;gt;Sep 22 02:15:11 mail_logs: Info: MID 3035876 ICID 1856276 From: &amp;lt;vivek.sood@swiftsecuritas.in&amp;gt;&lt;BR /&gt;&amp;lt;38&amp;gt;Sep 22 02:15:11 mail_logs: Info: Start MID 3035876 ICID 1856276&lt;/P&gt;&lt;P&gt;I have extract the field and i&amp;nbsp; want to create a table to get statistic:&lt;/P&gt;&lt;P&gt;table sender,message_subject,recipient,quarantine_dest,reason,virus_vendor_category&lt;/P&gt;&lt;P&gt;When i try it, i got a table per one line. How to concatenate all line to get all statistics, please&lt;/P&gt;&lt;P&gt;Rgds&lt;/P&gt;&lt;P&gt;silverem&lt;/P&gt;</description>
      <pubDate>Tue, 22 Sep 2020 09:52:14 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/splunk-concatenate-field-in-table/m-p/520772#M146703</guid>
      <dc:creator>silverem78</dc:creator>
      <dc:date>2020-09-22T09:52:14Z</dc:date>
    </item>
    <item>
      <title>Re: splunk concatenate field in table</title>
      <link>https://community.splunk.com/t5/Splunk-Search/splunk-concatenate-field-in-table/m-p/520773#M146704</link>
      <description>&lt;P&gt;What statistic do you want? Just a count of all events?&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;| stats count&lt;/LI-CODE&gt;&lt;P&gt;Count by Sender&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;| stats count by Sender&lt;/LI-CODE&gt;</description>
      <pubDate>Tue, 22 Sep 2020 09:58:47 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/splunk-concatenate-field-in-table/m-p/520773#M146704</guid>
      <dc:creator>ITWhisperer</dc:creator>
      <dc:date>2020-09-22T09:58:47Z</dc:date>
    </item>
    <item>
      <title>Re: splunk concatenate field in table</title>
      <link>https://community.splunk.com/t5/Splunk-Search/splunk-concatenate-field-in-table/m-p/520774#M146705</link>
      <description>&lt;P&gt;I want in fact a table which give me per line for every threat per user the follwing details&lt;/P&gt;&lt;P&gt;example:&lt;/P&gt;&lt;P&gt;sender,message_subject,recipient,reason,virus_vendor_category&lt;/P&gt;&lt;P&gt;vivek.sood@swiftsecuritas.in,info@mycompany.com,Revised Order 21-09-20, "Virus" (a/v verdict:VIRAL), CXmail/RtfObf-D&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 22 Sep 2020 10:16:45 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/splunk-concatenate-field-in-table/m-p/520774#M146705</guid>
      <dc:creator>silverem78</dc:creator>
      <dc:date>2020-09-22T10:16:45Z</dc:date>
    </item>
    <item>
      <title>Re: splunk concatenate field in table</title>
      <link>https://community.splunk.com/t5/Splunk-Search/splunk-concatenate-field-in-table/m-p/520775#M146706</link>
      <description>&lt;P&gt;That doesn't really explain what statistic you want. Can you give an example of what you would like the table to look like?&lt;/P&gt;</description>
      <pubDate>Tue, 22 Sep 2020 10:12:15 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/splunk-concatenate-field-in-table/m-p/520775#M146706</guid>
      <dc:creator>ITWhisperer</dc:creator>
      <dc:date>2020-09-22T10:12:15Z</dc:date>
    </item>
    <item>
      <title>Re: splunk concatenate field in table</title>
      <link>https://community.splunk.com/t5/Splunk-Search/splunk-concatenate-field-in-table/m-p/520781#M146707</link>
      <description>&lt;P&gt;&lt;STRONG&gt;Example:&amp;nbsp; in one line get the following extract from multiple line in the search: for each specific MID, display the associated field sender,message_subject,recipient,reason,virus_vendor_category&lt;BR /&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;,MID, sender,message_subject,recipient,reason,virus_vendor_category&lt;/P&gt;&lt;P&gt;3035876,vivek.sood@swiftsecuritas.in,info@mycompany.com,Revised Order 21-09-20, "Virus" (a/v verdict:VIRAL), CXmail/RtfObf-D&lt;/P&gt;&lt;P&gt;&lt;A href="mailto:vivek.sood@swiftsecuritas.in" target="_blank" rel="noopener"&gt;vivek.sood@swiftsecuritas.in&lt;/A&gt; is in a line,&lt;/P&gt;&lt;P&gt;each field are in different lines&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 22 Sep 2020 10:37:27 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/splunk-concatenate-field-in-table/m-p/520781#M146707</guid>
      <dc:creator>silverem78</dc:creator>
      <dc:date>2020-09-22T10:37:27Z</dc:date>
    </item>
    <item>
      <title>Re: splunk concatenate field in table</title>
      <link>https://community.splunk.com/t5/Splunk-Search/splunk-concatenate-field-in-table/m-p/520784#M146708</link>
      <description>&lt;P&gt;Which field identifies these as all being part of the same threat?&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;| stats values(sender) as sender, values(message_subject) as message_subject, values(recipient) as recipient, values(reason) as reason, values(virus_vendor_category) by virus_vendor_category by id
| fields - id&lt;/LI-CODE&gt;</description>
      <pubDate>Tue, 22 Sep 2020 10:35:03 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/splunk-concatenate-field-in-table/m-p/520784#M146708</guid>
      <dc:creator>ITWhisperer</dc:creator>
      <dc:date>2020-09-22T10:35:03Z</dc:date>
    </item>
    <item>
      <title>Re: splunk concatenate field in table</title>
      <link>https://community.splunk.com/t5/Splunk-Search/splunk-concatenate-field-in-table/m-p/520787#M146709</link>
      <description>&lt;P&gt;Ok thank you.&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Example:&amp;nbsp; in one line get the following extract from multiple line in the search: for each specific MID, display the associated field sender,message_subject,recipient,reason,virus_vendor_category&lt;BR /&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;,MID, sender,message_subject,recipient,reason,virus_vendor_category&lt;/P&gt;&lt;P&gt;3035876,vivek.sood@swiftsecuritas.in,info@mycompany.com,Revised Order 21-09-20, "Virus" (a/v verdict:VIRAL), CXmail/RtfObf-D&lt;/P&gt;&lt;P&gt;3035879,vivek.sood2@swiftsecuritas.in,info2@mycompany.com,Invoice 21-09-20, "Virus" (a/v verdict:VIRAL), CXmail/RtfObf-B&lt;/P&gt;&lt;P&gt;3035880,vivek.sood3@swiftsecuritas.in,info@mycompany.com,Invoice2 21-09-20, "Virus" (a/v verdict:VIRAL), CXmail/RtfObf-D&lt;/P&gt;</description>
      <pubDate>Tue, 22 Sep 2020 10:42:21 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/splunk-concatenate-field-in-table/m-p/520787#M146709</guid>
      <dc:creator>silverem78</dc:creator>
      <dc:date>2020-09-22T10:42:21Z</dc:date>
    </item>
    <item>
      <title>Re: splunk concatenate field in table</title>
      <link>https://community.splunk.com/t5/Splunk-Search/splunk-concatenate-field-in-table/m-p/520788#M146710</link>
      <description>&lt;LI-CODE lang="markup"&gt;| stats values(sender) as sender, values(message_subject) as message_subject, values(recipient) as recipient, values(reason) as reason, values(virus_vendor_category) by virus_vendor_category by MID
| fields - MID&lt;/LI-CODE&gt;&lt;P&gt;The fields line removes the MID from the table if you don't want to show that&lt;/P&gt;</description>
      <pubDate>Tue, 22 Sep 2020 10:42:38 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/splunk-concatenate-field-in-table/m-p/520788#M146710</guid>
      <dc:creator>ITWhisperer</dc:creator>
      <dc:date>2020-09-22T10:42:38Z</dc:date>
    </item>
    <item>
      <title>Re: splunk concatenate field in table</title>
      <link>https://community.splunk.com/t5/Splunk-Search/splunk-concatenate-field-in-table/m-p/520789#M146711</link>
      <description>&lt;P&gt;MID is not a field but is displayed in the line. So i think i need to use regex expression.&lt;/P&gt;&lt;P&gt;For each specific MID displayed in each line,&amp;nbsp;&amp;nbsp; diplays in a table , MID id and associated stats values&lt;/P&gt;</description>
      <pubDate>Tue, 22 Sep 2020 10:52:02 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/splunk-concatenate-field-in-table/m-p/520789#M146711</guid>
      <dc:creator>silverem78</dc:creator>
      <dc:date>2020-09-22T10:52:02Z</dc:date>
    </item>
    <item>
      <title>Re: splunk concatenate field in table</title>
      <link>https://community.splunk.com/t5/Splunk-Search/splunk-concatenate-field-in-table/m-p/520790#M146712</link>
      <description>&lt;P&gt;What is the field name that you have extracted the MID into?&lt;/P&gt;</description>
      <pubDate>Tue, 22 Sep 2020 10:46:09 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/splunk-concatenate-field-in-table/m-p/520790#M146712</guid>
      <dc:creator>ITWhisperer</dc:creator>
      <dc:date>2020-09-22T10:46:09Z</dc:date>
    </item>
    <item>
      <title>Re: splunk concatenate field in table</title>
      <link>https://community.splunk.com/t5/Splunk-Search/splunk-concatenate-field-in-table/m-p/520802#M146713</link>
      <description>&lt;P&gt;I want to check MID with the value :&lt;/P&gt;&lt;P&gt;14:44:56 mail_logs: Info: MID 3037591 SPF: mailfrom&lt;/P&gt;&lt;P&gt;|rex "\s+MID\s+\&amp;lt;\|?(?&amp;lt;MID&amp;gt;[^\&amp;gt;]+)" ?&lt;/P&gt;</description>
      <pubDate>Tue, 22 Sep 2020 11:48:46 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/splunk-concatenate-field-in-table/m-p/520802#M146713</guid>
      <dc:creator>silverem78</dc:creator>
      <dc:date>2020-09-22T11:48:46Z</dc:date>
    </item>
    <item>
      <title>Re: splunk concatenate field in table</title>
      <link>https://community.splunk.com/t5/Splunk-Search/splunk-concatenate-field-in-table/m-p/520812#M146715</link>
      <description>&lt;P&gt;Based on the example log, there are no brackets around MID value and I suspect you just want the MID near the beginning of the log, so try&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;| rex "info:\s+MID\s+(?&amp;lt;MID&amp;gt;[^\s]+)"&lt;/LI-CODE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 22 Sep 2020 11:55:09 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/splunk-concatenate-field-in-table/m-p/520812#M146715</guid>
      <dc:creator>ITWhisperer</dc:creator>
      <dc:date>2020-09-22T11:55:09Z</dc:date>
    </item>
    <item>
      <title>Re: splunk concatenate field in table</title>
      <link>https://community.splunk.com/t5/Splunk-Search/splunk-concatenate-field-in-table/m-p/520864#M146727</link>
      <description>&lt;P&gt;I found what i want :&lt;/P&gt;&lt;P&gt;index = * sourcetype="cisco:esa:textmail" | eventstats values(src) AS cs_ip BY icid&lt;BR /&gt;| eventstats values(dest) AS ss_ip BY dcid&lt;BR /&gt;| eval recipient_count=mvcount(recipient)&lt;BR /&gt;| stats values(internal_message_id) AS tmpMID&lt;BR /&gt;values(icid) AS icid&lt;BR /&gt;values(sender) AS sender&lt;BR /&gt;values(recipient) AS recipient&lt;BR /&gt;values(message_size) AS message_size values(antivirus_status) as antivirus_status&lt;BR /&gt;values(quarantine_dest) as quarantine_dest values(reason) as reason values(virus_vendor_category) as virus_vendor_category&lt;BR /&gt;values(response) AS response&lt;BR /&gt;values(message_subject) as message_subject&lt;BR /&gt;values(cs_ip) AS cs_ip&lt;BR /&gt;values(ss_ip) AS ss_ip&lt;BR /&gt;values(dcid) AS dcid BY internal_message_id&lt;BR /&gt;| eval recipient_count=mvcount(recipient)&lt;BR /&gt;| eval mid=tmpMID&lt;BR /&gt;| mvexpand mid&lt;BR /&gt;| eventstats values(tmpMID) AS tmp BY mid | eval t=mvjoin(tmp, " ")&lt;BR /&gt;| stats values(sender) AS sender values(recipient) AS recipient&lt;BR /&gt;values(message_subject) as subject values(antivirus_status) as antivirus_status&lt;BR /&gt;values(quarantine_dest) as quarantine_dest values(reason) as reason values(virus_vendor_category) as virus_vendor_category&lt;BR /&gt;max(message_size) AS message_size&lt;BR /&gt;max(recipient_count) AS recipient_count&lt;BR /&gt;values(internal_message_id) AS internal_message_id&lt;BR /&gt;values(dcid) AS dcid&lt;BR /&gt;values(response) AS response&lt;BR /&gt;values(cs_ip) AS cs_ip&lt;BR /&gt;values(ss_ip) AS ss_ip BY icid&lt;/P&gt;</description>
      <pubDate>Tue, 22 Sep 2020 13:48:47 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/splunk-concatenate-field-in-table/m-p/520864#M146727</guid>
      <dc:creator>silverem78</dc:creator>
      <dc:date>2020-09-22T13:48:47Z</dc:date>
    </item>
  </channel>
</rss>

