Splunk Search

Flatten transaction

msarro
Builder

Greetings everyone. This is hopefully a pretty simple question - is there a way to "flatten" transactions? After it runs, you end up with a transaction which is a multiline event. What I'd like to do is flatten the lines into a single line of text. For items where there are multiple matching lines, compress them into a single line which is semicolon delimited or something. Any ideas?

Tags (1)
0 Karma

Ayn
Legend

You could replace newline characters using rex:

<yoursearch> | rex field=_raw mode=sed "s/[\r\n]//g"

The default output in the search app will still wrap lines though, so if you want everything unwrapped on one single line one option would be to use table.

<yoursearch> | eval eventtext=_raw | table _time eventtext

(using _raw directly in table does not work).

0 Karma
Get Updates on the Splunk Community!

The OpenTelemetry Certified Associate (OTCA) Exam

What’s this OTCA exam? The Linux Foundation offers the OpenTelemetry Certified Associate (OTCA) credential to ...

From Manual to Agentic: Level Up Your SOC at Cisco Live

Welcome to the Era of the Agentic SOC   Are you tired of being a manual alert responder? The security ...

Splunk Classroom Chronicles: Training Tales and Testimonials (Episode 4)

Welcome back to Splunk Classroom Chronicles, our ongoing series where we shine a light on what really happens ...