<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: mvexpand query in Splunk Search</title>
    <link>https://community.splunk.com/t5/Splunk-Search/mvexpand-query/m-p/176472#M50687</link>
    <description>&lt;P&gt;[default]&lt;BR /&gt;
REPORT-mvuniveralip = mvuniversalip&lt;/P&gt;

&lt;P&gt;[mvuniversalip]&lt;BR /&gt;
REGEX = (?Pd+.d+.d+.d+)&lt;BR /&gt;
MV_ADD = 1&lt;/P&gt;</description>
    <pubDate>Fri, 13 Mar 2015 14:44:20 GMT</pubDate>
    <dc:creator>splunkn</dc:creator>
    <dc:date>2015-03-13T14:44:20Z</dc:date>
    <item>
      <title>mvexpand query</title>
      <link>https://community.splunk.com/t5/Splunk-Search/mvexpand-query/m-p/176466#M50681</link>
      <description>&lt;P&gt;I extracted a multivalued field named universal_ip to extract all IPs (whatever it is source or dest) in all events.&lt;/P&gt;

&lt;P&gt;One of my event looks like below&lt;BR /&gt;
12/Mar/2015:13:38:01 +0000] 11.22.33.44 GET /sdffd/sdfsdfh.sdfsdhhf/sdfhsdfhj&lt;/P&gt;

&lt;P&gt;If I run the query like this (index=* | mvexpand universal_ip | table _raw) ,it returns the result twice for each event.&lt;BR /&gt;
For example the above event found twice in my results.&lt;/P&gt;

&lt;P&gt;Could you please clarify why mvexpand command gives the result twice. Here single value is found for multivalue field universal_ip.&lt;BR /&gt;
Then how it returns twice?&lt;/P&gt;

&lt;P&gt;Thanks in advance&lt;/P&gt;</description>
      <pubDate>Fri, 13 Mar 2015 13:53:36 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/mvexpand-query/m-p/176466#M50681</guid>
      <dc:creator>splunkn</dc:creator>
      <dc:date>2015-03-13T13:53:36Z</dc:date>
    </item>
    <item>
      <title>Re: mvexpand query</title>
      <link>https://community.splunk.com/t5/Splunk-Search/mvexpand-query/m-p/176467#M50682</link>
      <description>&lt;P&gt;can you clarify your question?  I'm not sure what you mean by TIME3 here.  &lt;/P&gt;</description>
      <pubDate>Fri, 13 Mar 2015 14:10:19 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/mvexpand-query/m-p/176467#M50682</guid>
      <dc:creator>emiller42</dc:creator>
      <dc:date>2015-03-13T14:10:19Z</dc:date>
    </item>
    <item>
      <title>Re: mvexpand query</title>
      <link>https://community.splunk.com/t5/Splunk-Search/mvexpand-query/m-p/176468#M50683</link>
      <description>&lt;P&gt;I have edited my question.Could you pls clarify now&lt;/P&gt;</description>
      <pubDate>Fri, 13 Mar 2015 14:18:44 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/mvexpand-query/m-p/176468#M50683</guid>
      <dc:creator>splunkn</dc:creator>
      <dc:date>2015-03-13T14:18:44Z</dc:date>
    </item>
    <item>
      <title>Re: mvexpand query</title>
      <link>https://community.splunk.com/t5/Splunk-Search/mvexpand-query/m-p/176469#M50684</link>
      <description>&lt;P&gt;It would be helpful to show how you are doing the extraction. Can you please show us how you are getting &lt;CODE&gt;universal_ip&lt;/CODE&gt; out of the event?&lt;/P&gt;</description>
      <pubDate>Fri, 13 Mar 2015 14:26:42 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/mvexpand-query/m-p/176469#M50684</guid>
      <dc:creator>aweitzman</dc:creator>
      <dc:date>2015-03-13T14:26:42Z</dc:date>
    </item>
    <item>
      <title>Re: mvexpand query</title>
      <link>https://community.splunk.com/t5/Splunk-Search/mvexpand-query/m-p/176470#M50685</link>
      <description>&lt;P&gt;Looks like you have two active field extraction for the field universal_ip. As per your sample event, I see there is only 1 IP address per event, so not sure why/how a multivalued field extraction is used/setup. Can  you run following and check how many field extractions you find for this sourcetype of yours&lt;/P&gt;

&lt;P&gt;$Splunk_Home/bin/splunk cmd btool props list YourSoureType&lt;/P&gt;</description>
      <pubDate>Fri, 13 Mar 2015 14:33:12 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/mvexpand-query/m-p/176470#M50685</guid>
      <dc:creator>somesoni2</dc:creator>
      <dc:date>2015-03-13T14:33:12Z</dc:date>
    </item>
    <item>
      <title>Re: mvexpand query</title>
      <link>https://community.splunk.com/t5/Splunk-Search/mvexpand-query/m-p/176471#M50686</link>
      <description>&lt;P&gt;Somesoni,&lt;/P&gt;

&lt;P&gt;I need to extract this ip field from all sourcetypes. so I have used default stanza.&lt;BR /&gt;
Also in this sample event there is only one IP. But in some other events we could find more than one IPs&lt;/P&gt;

&lt;P&gt;[default]&lt;BR /&gt;
REPORT-mvuniveralip = mvuniversalip&lt;/P&gt;

&lt;P&gt;[mvuniversalip]&lt;BR /&gt;
REGEX = (?P\d+.\d+.\d+.\d+)&lt;BR /&gt;
MV_ADD = 1&lt;/P&gt;</description>
      <pubDate>Fri, 13 Mar 2015 14:41:17 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/mvexpand-query/m-p/176471#M50686</guid>
      <dc:creator>splunkn</dc:creator>
      <dc:date>2015-03-13T14:41:17Z</dc:date>
    </item>
    <item>
      <title>Re: mvexpand query</title>
      <link>https://community.splunk.com/t5/Splunk-Search/mvexpand-query/m-p/176472#M50687</link>
      <description>&lt;P&gt;[default]&lt;BR /&gt;
REPORT-mvuniveralip = mvuniversalip&lt;/P&gt;

&lt;P&gt;[mvuniversalip]&lt;BR /&gt;
REGEX = (?Pd+.d+.d+.d+)&lt;BR /&gt;
MV_ADD = 1&lt;/P&gt;</description>
      <pubDate>Fri, 13 Mar 2015 14:44:20 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/mvexpand-query/m-p/176472#M50687</guid>
      <dc:creator>splunkn</dc:creator>
      <dc:date>2015-03-13T14:44:20Z</dc:date>
    </item>
    <item>
      <title>Re: mvexpand query</title>
      <link>https://community.splunk.com/t5/Splunk-Search/mvexpand-query/m-p/176473#M50688</link>
      <description>&lt;P&gt;Can you run following query and tell how many values you get for field universal_ip (basically apply timerange/filter to select just one row mentioned in your sample)&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;index=* sourcetype=YourSourcetype "More filters" | table _raw, universal_ip | eval count=mvcount(universal_ip)
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;The count field should match with no of Ips in your _raw event.&lt;/P&gt;</description>
      <pubDate>Fri, 13 Mar 2015 14:47:22 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/mvexpand-query/m-p/176473#M50688</guid>
      <dc:creator>somesoni2</dc:creator>
      <dc:date>2015-03-13T14:47:22Z</dc:date>
    </item>
    <item>
      <title>Re: mvexpand query</title>
      <link>https://community.splunk.com/t5/Splunk-Search/mvexpand-query/m-p/176474#M50689</link>
      <description>&lt;P&gt;First of all, you use a MV field extraction for events that never contain more than 1 IP.  That is your problem; get rid of your &lt;CODE&gt;MV_ADD&lt;/CODE&gt; line and it will work as you expect.&lt;/P&gt;</description>
      <pubDate>Tue, 19 May 2015 18:31:06 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/mvexpand-query/m-p/176474#M50689</guid>
      <dc:creator>woodcock</dc:creator>
      <dc:date>2015-05-19T18:31:06Z</dc:date>
    </item>
  </channel>
</rss>

