<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: How to handle events where the same field occurs multiple times? in Splunk Search</title>
    <link>https://community.splunk.com/t5/Splunk-Search/How-to-handle-events-where-the-same-field-occurs-multiple-times/m-p/241611#M71844</link>
    <description>&lt;P&gt;How are extracting the fields now?&lt;/P&gt;</description>
    <pubDate>Mon, 14 Mar 2016 17:08:21 GMT</pubDate>
    <dc:creator>richgalloway</dc:creator>
    <dc:date>2016-03-14T17:08:21Z</dc:date>
    <item>
      <title>How to handle events where the same field occurs multiple times?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-handle-events-where-the-same-field-occurs-multiple-times/m-p/241610#M71843</link>
      <description>&lt;P&gt;Hey,&lt;/P&gt;

&lt;P&gt;I have some data that looks like this:&lt;/P&gt;

&lt;P&gt;&lt;CODE&gt;Jan 01 01:02:03 host123 serial123 Version=1.0, Check=01 , Check=02 , Check=03 , Check=04 , Check=05 , Server=ABC, Server=DEF&lt;/CODE&gt;&lt;/P&gt;

&lt;P&gt;Splunk is currently only extracting the first occurrence of field Check (i.e. 01) and field Server (i.e. ABC) by default.&lt;BR /&gt;
What do I need to add to the Splunk config to force all occurrences of these fields to be extracted?&lt;/P&gt;

&lt;P&gt;Thanks&lt;/P&gt;</description>
      <pubDate>Mon, 14 Mar 2016 16:48:55 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-handle-events-where-the-same-field-occurs-multiple-times/m-p/241610#M71843</guid>
      <dc:creator>Ant1D</dc:creator>
      <dc:date>2016-03-14T16:48:55Z</dc:date>
    </item>
    <item>
      <title>Re: How to handle events where the same field occurs multiple times?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-handle-events-where-the-same-field-occurs-multiple-times/m-p/241611#M71844</link>
      <description>&lt;P&gt;How are extracting the fields now?&lt;/P&gt;</description>
      <pubDate>Mon, 14 Mar 2016 17:08:21 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-handle-events-where-the-same-field-occurs-multiple-times/m-p/241611#M71844</guid>
      <dc:creator>richgalloway</dc:creator>
      <dc:date>2016-03-14T17:08:21Z</dc:date>
    </item>
    <item>
      <title>Re: How to handle events where the same field occurs multiple times?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-handle-events-where-the-same-field-occurs-multiple-times/m-p/241612#M71845</link>
      <description>&lt;P&gt;You can do this through field transformations with the multivalue checkbox checked: &lt;BR /&gt;
&lt;A href="http://docs.splunk.com/Documentation/Splunk/latest/Knowledge/Managefieldtransforms"&gt;http://docs.splunk.com/Documentation/Splunk/latest/Knowledge/Managefieldtransforms&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 14 Mar 2016 18:08:26 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-handle-events-where-the-same-field-occurs-multiple-times/m-p/241612#M71845</guid>
      <dc:creator>martin_mueller</dc:creator>
      <dc:date>2016-03-14T18:08:26Z</dc:date>
    </item>
    <item>
      <title>Re: How to handle events where the same field occurs multiple times?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-handle-events-where-the-same-field-occurs-multiple-times/m-p/241613#M71846</link>
      <description>&lt;P&gt;Splunk extracts the first occurrence only by default. What I am expecting is for the field "Check" to be assigned values 01, 02, 03, 04 and 05&lt;/P&gt;</description>
      <pubDate>Tue, 15 Mar 2016 07:59:39 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-handle-events-where-the-same-field-occurs-multiple-times/m-p/241613#M71846</guid>
      <dc:creator>Ant1D</dc:creator>
      <dc:date>2016-03-15T07:59:39Z</dc:date>
    </item>
    <item>
      <title>Re: How to handle events where the same field occurs multiple times?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-handle-events-where-the-same-field-occurs-multiple-times/m-p/241614#M71847</link>
      <description>&lt;P&gt;Hi, thanks for this but it is not what I am looking for. I want the fields "Check" and "Server" to be assigned all of the fields in the event without having to use any additional search commands. Is there Splunk config which will force this to happen?&lt;/P&gt;</description>
      <pubDate>Tue, 15 Mar 2016 08:03:45 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-handle-events-where-the-same-field-occurs-multiple-times/m-p/241614#M71847</guid>
      <dc:creator>Ant1D</dc:creator>
      <dc:date>2016-03-15T08:03:45Z</dc:date>
    </item>
    <item>
      <title>Re: How to handle events where the same field occurs multiple times?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-handle-events-where-the-same-field-occurs-multiple-times/m-p/241615#M71848</link>
      <description>&lt;P&gt;Looks like I got the wrong link, fixed... that's config only. &lt;/P&gt;</description>
      <pubDate>Tue, 15 Mar 2016 08:21:37 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-handle-events-where-the-same-field-occurs-multiple-times/m-p/241615#M71848</guid>
      <dc:creator>martin_mueller</dc:creator>
      <dc:date>2016-03-15T08:21:37Z</dc:date>
    </item>
    <item>
      <title>Re: How to handle events where the same field occurs multiple times?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-handle-events-where-the-same-field-occurs-multiple-times/m-p/241616#M71849</link>
      <description>&lt;P&gt;&lt;A href="http://docs.splunk.com/Documentation/Splunk/latest/Knowledge/Createandmaintainsearch-timefieldextractionsthroughconfigurationfiles"&gt;http://docs.splunk.com/Documentation/Splunk/latest/Knowledge/Createandmaintainsearch-timefieldextractionsthroughconfigurationfiles&lt;/A&gt;&lt;/P&gt;

&lt;P&gt;The section titled &lt;STRONG&gt;Handling events with multivalue fields&lt;/STRONG&gt; seems to be what I am looking for. The below does what I need.&lt;/P&gt;

&lt;P&gt;In transforms.conf:&lt;/P&gt;

&lt;P&gt;&lt;CODE&gt;[mv-check]&lt;/CODE&gt;&lt;BR /&gt;
&lt;CODE&gt;REGEX = Check=(?&amp;lt;Check&amp;gt;\d+)[,\s]+&lt;/CODE&gt;&lt;BR /&gt;
&lt;CODE&gt;MV_ADD = true&lt;BR /&gt;
&lt;/CODE&gt;&lt;BR /&gt;
In props.conf:&lt;/P&gt;

&lt;P&gt;&lt;CODE&gt;REPORT-mychecks = mv-check&lt;/CODE&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 15 Mar 2016 09:32:12 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-handle-events-where-the-same-field-occurs-multiple-times/m-p/241616#M71849</guid>
      <dc:creator>Ant1D</dc:creator>
      <dc:date>2016-03-15T09:32:12Z</dc:date>
    </item>
  </channel>
</rss>

