<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Multi Field values into Single field value in Splunk Search</title>
    <link>https://community.splunk.com/t5/Splunk-Search/Multi-Field-values-into-Single-field-value/m-p/486850#M193741</link>
    <description>&lt;P&gt;I need help in getting multiple field values into single field to compare it and get the match if any.&lt;/P&gt;

&lt;P&gt;For example, I have Field 1, Field 2, and so on till Field 10 and similarly each field is having unique value. I need to check if any of the value is matching with other events and get that value.&lt;/P&gt;

&lt;P&gt;Please help on this and let me know if more info needed.&lt;/P&gt;</description>
    <pubDate>Tue, 19 Nov 2019 15:45:40 GMT</pubDate>
    <dc:creator>kamaleshwar</dc:creator>
    <dc:date>2019-11-19T15:45:40Z</dc:date>
    <item>
      <title>Multi Field values into Single field value</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Multi-Field-values-into-Single-field-value/m-p/486850#M193741</link>
      <description>&lt;P&gt;I need help in getting multiple field values into single field to compare it and get the match if any.&lt;/P&gt;

&lt;P&gt;For example, I have Field 1, Field 2, and so on till Field 10 and similarly each field is having unique value. I need to check if any of the value is matching with other events and get that value.&lt;/P&gt;

&lt;P&gt;Please help on this and let me know if more info needed.&lt;/P&gt;</description>
      <pubDate>Tue, 19 Nov 2019 15:45:40 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Multi-Field-values-into-Single-field-value/m-p/486850#M193741</guid>
      <dc:creator>kamaleshwar</dc:creator>
      <dc:date>2019-11-19T15:45:40Z</dc:date>
    </item>
    <item>
      <title>Re: Multi Field values into Single field value</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Multi-Field-values-into-Single-field-value/m-p/486851#M193742</link>
      <description>&lt;P&gt;Can you show some example events and the expected output?&lt;/P&gt;</description>
      <pubDate>Tue, 19 Nov 2019 18:02:23 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Multi-Field-values-into-Single-field-value/m-p/486851#M193742</guid>
      <dc:creator>richgalloway</dc:creator>
      <dc:date>2019-11-19T18:02:23Z</dc:date>
    </item>
    <item>
      <title>Re: Multi Field values into Single field value</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Multi-Field-values-into-Single-field-value/m-p/486852#M193743</link>
      <description>&lt;P&gt;Hi, &lt;/P&gt;

&lt;P&gt;To combine all fields in to 1 , you can try below query &lt;/P&gt;

&lt;P&gt;&lt;CODE&gt;| eval output=(mvappend(field1, field2, field3, field4, field5, field6, field7, field8, field9, field10)) | mvexpand output  | dedup output | table output&lt;/CODE&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 19 Nov 2019 18:52:46 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Multi-Field-values-into-Single-field-value/m-p/486852#M193743</guid>
      <dc:creator>Anantha123</dc:creator>
      <dc:date>2019-11-19T18:52:46Z</dc:date>
    </item>
    <item>
      <title>Re: Multi Field values into Single field value</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Multi-Field-values-into-Single-field-value/m-p/486853#M193744</link>
      <description>&lt;P&gt;My log would have multiple user ids: userid1: "value"; userid2: "value" and so on. Here I need to get the userid value and compare it with other events to identify the same user id has been used in different activities/ multiple times.&lt;/P&gt;

&lt;P&gt;The output would be like:&lt;BR /&gt;
User ID    Activity   Count(Activity)&lt;/P&gt;

&lt;P&gt;Let me know if this is helpful.&lt;/P&gt;</description>
      <pubDate>Wed, 20 Nov 2019 08:36:00 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Multi-Field-values-into-Single-field-value/m-p/486853#M193744</guid>
      <dc:creator>kamaleshwar</dc:creator>
      <dc:date>2019-11-20T08:36:00Z</dc:date>
    </item>
    <item>
      <title>Re: Multi Field values into Single field value</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Multi-Field-values-into-Single-field-value/m-p/486854#M193745</link>
      <description>&lt;P&gt;The output should not be the concatenated value of all field values, It should unique value only. Because I need to compare each value with other events values to get the matched one using the same value in different activities and get them out from that.&lt;/P&gt;</description>
      <pubDate>Wed, 20 Nov 2019 08:38:58 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Multi-Field-values-into-Single-field-value/m-p/486854#M193745</guid>
      <dc:creator>kamaleshwar</dc:creator>
      <dc:date>2019-11-20T08:38:58Z</dc:date>
    </item>
    <item>
      <title>Re: Multi Field values into Single field value</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Multi-Field-values-into-Single-field-value/m-p/486855#M193746</link>
      <description>&lt;P&gt;This worked, thanks a lot.&lt;/P&gt;</description>
      <pubDate>Fri, 22 Nov 2019 09:16:34 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Multi-Field-values-into-Single-field-value/m-p/486855#M193746</guid>
      <dc:creator>kamaleshwar</dc:creator>
      <dc:date>2019-11-22T09:16:34Z</dc:date>
    </item>
  </channel>
</rss>

