Splunk Search

Combining details from two log entries into one table under common ID

New Member

Hello Comminity,

Here goes the more detailed descrition

2019-07-12 11:19:55.519 [VDI111][Process1][Info] msg=report;rpt_comment=Installation;rpt_Case_Id=6547456
2019-07-12 11:19:55.519 [VDI111][Process1][Info] msg=report;rpt_comment=Deinstallation;rpt_Case_Id=6547456

I want to create one row i a table where I have:

6547456 | Installation | Deinstallation

I tried search like:

VDI="VDI1" Process="Process1" rpt_comment* | table _time, rpt_Case_Id, rpt_comment

But it does split the rows for the ID

Hope you can come up with some idea.


Tags (1)
0 Karma


This search will create a single row for each ID, but you will have multiple values in each cell.

VDI="VDI1" Process="Process1" rpt_comment* 
| stats values(_time) as _time, values(rpt_comment) as rpt_comment by rpt_Case_Id 
| table _time, rpt_Case_Id, rpt_comment
If this reply helps you, Karma would be appreciated.
0 Karma
Get Updates on the Splunk Community!

What's New in Splunk Cloud Platform 9.2.2403?

Hi Splunky people! We are excited to share the newest updates in Splunk Cloud Platform 9.2.2403! Analysts can ...

Stay Connected: Your Guide to July and August Tech Talks, Office Hours, and Webinars!

Dive into our sizzling summer lineup for July and August Community Office Hours and Tech Talks. Scroll down to ...

Edge Processor Scaling, Energy & Manufacturing Use Cases, and More New Articles on ...

Splunk Lantern is a Splunk customer success center that provides advice from Splunk experts on valuable data ...