<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Combining field names into one new result name in Splunk Search</title>
    <link>https://community.splunk.com/t5/Splunk-Search/Combining-field-names-into-one-new-result-name/m-p/434822#M168384</link>
    <description>&lt;P&gt;Hi,&lt;/P&gt;

&lt;P&gt;You can also use field aliases in this case, refer the below link for more info and let me know if it works for you.&lt;/P&gt;

&lt;P&gt;&lt;A href="https://docs.splunk.com/Documentation/Splunk/7.1.1/Knowledge/Addaliasestofields"&gt;https://docs.splunk.com/Documentation/Splunk/7.1.1/Knowledge/Addaliasestofields&lt;/A&gt;&lt;/P&gt;</description>
    <pubDate>Wed, 11 Jul 2018 11:33:41 GMT</pubDate>
    <dc:creator>manish_singh_77</dc:creator>
    <dc:date>2018-07-11T11:33:41Z</dc:date>
    <item>
      <title>Combining field names into one new result name</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Combining-field-names-into-one-new-result-name/m-p/434819#M168381</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;

&lt;P&gt;I'm trying to combine results of varying operating systems into one, for example:&lt;/P&gt;

&lt;P&gt;Microsoft Windows Server 2008&lt;BR /&gt;
Microsoft Windows Server 2008r2&lt;BR /&gt;
Microsoft Windows Server 2012&lt;/P&gt;

&lt;P&gt;All to be listed as&lt;/P&gt;

&lt;P&gt;Windows Server&lt;/P&gt;

&lt;P&gt;Does anyone know I may do this? I tried this but wouldn't work:&lt;/P&gt;

&lt;P&gt;...chart count(signature) by operating-system | eval sort_field=case(operating-system=="Microsoft Windows*",Windows Server)&lt;/P&gt;</description>
      <pubDate>Wed, 11 Jul 2018 10:03:44 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Combining-field-names-into-one-new-result-name/m-p/434819#M168381</guid>
      <dc:creator>Grant007701</dc:creator>
      <dc:date>2018-07-11T10:03:44Z</dc:date>
    </item>
    <item>
      <title>Re: Combining field names into one new result name</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Combining-field-names-into-one-new-result-name/m-p/434820#M168382</link>
      <description>&lt;P&gt;Three problems with your &lt;CODE&gt;eval&lt;/CODE&gt;:&lt;/P&gt;

&lt;OL&gt;
&lt;LI&gt;&lt;CODE&gt;operating-system&lt;/CODE&gt; would subtract &lt;CODE&gt;system&lt;/CODE&gt; from &lt;CODE&gt;operating&lt;/CODE&gt; - use single quotes to enclose non-standard field names.&lt;/LI&gt;
&lt;LI&gt;&lt;CODE&gt;=="Microsoft Windows*&lt;/CODE&gt; looks for literal equality, use &lt;CODE&gt;match()&lt;/CODE&gt; to allow regex-based matches.&lt;/LI&gt;
&lt;LI&gt;&lt;CODE&gt;Windows Server&lt;/CODE&gt; should throw syntax errors, enclose strings in double quotes.&lt;/LI&gt;
&lt;/OL&gt;</description>
      <pubDate>Wed, 11 Jul 2018 10:36:26 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Combining-field-names-into-one-new-result-name/m-p/434820#M168382</guid>
      <dc:creator>martin_mueller</dc:creator>
      <dc:date>2018-07-11T10:36:26Z</dc:date>
    </item>
    <item>
      <title>Re: Combining field names into one new result name</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Combining-field-names-into-one-new-result-name/m-p/434821#M168383</link>
      <description>&lt;P&gt;Thanks for this.&lt;/P&gt;

&lt;P&gt;Still struggling though, I have changed to the following:&lt;/P&gt;

&lt;P&gt;...chart count(signature) by operating-system | eval sort_field=case('operating-system'=match('operating-system',"Microsoft*","Windows Server",0))&lt;/P&gt;

&lt;P&gt;The arguments to the 'match' function are invalid.&lt;/P&gt;</description>
      <pubDate>Wed, 11 Jul 2018 11:15:50 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Combining-field-names-into-one-new-result-name/m-p/434821#M168383</guid>
      <dc:creator>Grant007701</dc:creator>
      <dc:date>2018-07-11T11:15:50Z</dc:date>
    </item>
    <item>
      <title>Re: Combining field names into one new result name</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Combining-field-names-into-one-new-result-name/m-p/434822#M168384</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;

&lt;P&gt;You can also use field aliases in this case, refer the below link for more info and let me know if it works for you.&lt;/P&gt;

&lt;P&gt;&lt;A href="https://docs.splunk.com/Documentation/Splunk/7.1.1/Knowledge/Addaliasestofields"&gt;https://docs.splunk.com/Documentation/Splunk/7.1.1/Knowledge/Addaliasestofields&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 11 Jul 2018 11:33:41 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Combining-field-names-into-one-new-result-name/m-p/434822#M168384</guid>
      <dc:creator>manish_singh_77</dc:creator>
      <dc:date>2018-07-11T11:33:41Z</dc:date>
    </item>
    <item>
      <title>Re: Combining field names into one new result name</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Combining-field-names-into-one-new-result-name/m-p/434823#M168385</link>
      <description>&lt;P&gt;See docs on &lt;CODE&gt;match()&lt;/CODE&gt;, it only takes two parameters: &lt;A href="http://docs.splunk.com/Documentation/Splunk/7.1.1/SearchReference/ConditionalFunctions#match.28SUBJECT.2C_.22REGEX.22.29"&gt;http://docs.splunk.com/Documentation/Splunk/7.1.1/SearchReference/ConditionalFunctions#match.28SUBJECT.2C_.22REGEX.22.29&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 11 Jul 2018 12:06:13 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Combining-field-names-into-one-new-result-name/m-p/434823#M168385</guid>
      <dc:creator>martin_mueller</dc:creator>
      <dc:date>2018-07-11T12:06:13Z</dc:date>
    </item>
  </channel>
</rss>

