Splunk Search

Convert multi values to different row entries

arunkuriakose0
Engager
10.40.x.x
10.4.x.x
13.x.x.x
KB: Windows  aXXXXfield3
  
Apply Security XXX.server
user
server

 

I have a table output of  a search  which look similar to the one shown above

Is it a possible way to conver this to the desired format mentioned

 

10.40.x.x

KB4571719: Windows 7 aXXXXfield3
  
Apply Security XXX.server
10.4.x.xKB4571719: Windows 7 aXXXXfield3
  
Apply Security XXX.user
13.x.x.xKB4571719: Windows 7 aXXXXfield3
  
Apply Security XXXserver
Labels (1)
0 Karma

ITWhisperer
SplunkTrust
SplunkTrust
| eval combined=mvzip(field1,field5,",")
| mvexpand combined
| eval field1=mvindex(split(combined,","),0)
| eval field5=mvindex(split(combined,","),1)
0 Karma
Get Updates on the Splunk Community!

See just what you’ve been missing | Observability tracks at Splunk University

Looking to sharpen your observability skills so you can better understand how to collect and analyze data from ...

Weezer at .conf25? Say it ain’t so!

Hello Splunkers, The countdown to .conf25 is on-and we've just turned up the volume! We're thrilled to ...

How SC4S Makes Suricata Logs Ingestion Simple

Network security monitoring has become increasingly critical for organizations of all sizes. Splunk has ...