Splunk Search

Fill the blank in a table

melonman
Motivator

Hi

I created a table using stats, it looks like Table A below
What I am trying to do is make create Table B.

Table A

Key1               Key2             FiledA    FiledB    FiledC   FiledD
------------------------------------------------------------------------
Key1-1             Key2-1            A-1      B-1       C-1      D-1
                                     A-2      B-2       C-2      D-1                                                   
Key1-2             Key2-2            A-3      B-2       C-3      D-2
                                     A-4      B-4       C-3      D-3 

Table B

Key1               Key2             FiledA    FiledB    FiledC   FiledD
------------------------------------------------------------------------
Key1-1             Key2-1            A-1      B-1       C-1      D-1
Key1-1             Key2-1            A-2      B-2       C-2      D-1
Key1-2             Key2-2            A-3      B-2       C-3      D-2
Key1-2             Key2-2            A-4      B-4       C-3      D-3

I was trying to do this by mvzip and mvexpand, but there are multiple multivalue fields,
so I need to do mvzip many times.

Any idea or approach to this would be appreciated.

Tags (1)
0 Karma
1 Solution

lguinn2
Legend

Try this

(source = S1) OR (source = S2) 
| stats count by key1 key2 fieldA fieldB fieldC  fieldD
| fields - count

but it's also difficult to say what will work when we have no examples of the actual data.

View solution in original post

0 Karma

lguinn2
Legend

Try this

(source = S1) OR (source = S2) 
| stats count by key1 key2 fieldA fieldB fieldC  fieldD
| fields - count

but it's also difficult to say what will work when we have no examples of the actual data.

0 Karma

vccsupport
New Member

From fieldA thru fieldD are not multivalue before connecting with STATS comamnd. This table is the results from STATS command.
Please suppose fieldA,B are defined by S1, and filedC,D are defined by S2. And these sources can connect by key1 and key2.
The search text is.....
(source = S1) OR (source = S2) | stats values(fieldA) as filedA values(fieldB) as fieldB values(fieldC) as fieldC values(fieldD) as fieldD by key1 key2 | table key1 key2 fieldA fieldB fieldC fieldD. Hope this will help.

0 Karma

yannK
Splunk Employee
Splunk Employee

hard to tell without knowing the search that produced this ( and which fields are single or multivalue)

Get Updates on the Splunk Community!

Fastest way to demo Observability

I’ve been having a lot of fun learning about Kubernetes and Observability. I set myself an interesting ...

September Community Champions: A Shoutout to Our Contributors!

As we close the books on another fantastic month, we want to take a moment to celebrate the people who are the ...

Splunk Decoded: Service Maps vs Service Analyzer Tree View vs Flow Maps

It’s Monday morning, and your phone is buzzing with alert escalations – your customer-facing portal is running ...