Splunk Search

Adding source path to table output

tom1981
Engager

I have the following search set up:

search string
| fields host raw
| fields - _time _indextime _sourcetype _subsecond _serial _bkt _cd _si _kv _timediff | head 1
| join append [ stats count | fields - count ]
| eval SourcePath=WHAT TO PUT HERE?
| eval ConfigItem="Config Item"
| eval PAGER="Pager"
| eval TEAM="Team"

| eval GROUP="Group"
| eval SHORTDESCRIPTION="Short Description"
| table host _raw SourcePath Config.Item PAGER TEAM GROUP SHORTDESCRIPTION
| rex mode=sed "s/\,//g"
| rex mode=sed "s/[^a-zA-Z0-9
-.]+/ /g"
| outputcsv file.csv

Everything is working as required, I am just not too sure what should I match eval SourcePath= with in order to obtain the string of the source log file's path?
Anyone able to assist?

Thanks a bunch!
Tom

0 Karma

tom1981
Engager

Events:

Before formatting;
alt text

After formating:
alt text

0 Karma

richgalloway
SplunkTrust
SplunkTrust

It's difficult to answer without knowing your data. Please share some sample (sanitized) events.

---
If this reply helps you, Karma would be appreciated.
0 Karma

tom1981
Engager

Hello,

Sorry for the delay.
Please see in the answer section for the event examples (cannot add pictures here)

Thanks a lot!

0 Karma

tom1981
Engager

Bump to top.

0 Karma
Get Updates on the Splunk Community!

Exciting News: The AppDynamics Community Joins Splunk!

Hello Splunkers,   I’d like to introduce myself—I’m Ryan, the former AppDynamics Community Manager, and I’m ...

The All New Performance Insights for Splunk

Splunk gives you amazing tools to analyze system data and make business-critical decisions, react to issues, ...

Good Sourcetype Naming

When it comes to getting data in, one of the earliest decisions made is what to use as a sourcetype. Often, ...