Splunk Search

How to append the result of a search to values of a multivalued field?

buttsurfer
Path Finder

 

I have a SPL search that returns a field with multiple values (names of lookups). I want to concat the lookup name and it's origin app, found with the search below:

      | rest splunk_server=local /servicesNS/-/-/saved/searches | table title eai:acl.app eai:acl.owner search | where match(search,"outputlookup\s+lookupname")

 

Labels (2)
0 Karma

ITWhisperer
SplunkTrust
SplunkTrust

You could try something like this

| rex max_match=0 field=search "outputlookup\s+(?<lookup>.+)"
| eval lookups=mvjoin(mvappend(title,lookup)," ")
0 Karma

richgalloway
SplunkTrust
SplunkTrust

There are two problems with the query.  The first is the table command is removing the lookupname field so there is nothing for match to look for.  The second is Splunk has two concatenation operators: + and . (dot).  IME, dot works better.

| rest splunk_server=local /servicesNS/-/-/saved/searches 
| eval lookupname="incident_settings" 
| eval matchstring="outputlookup\s"+lookupname 
| table title eai:acl.app eai:acl.owner search lookupname 
| where match(search,"outputlookup\s" . lookupname)

A word of caution: the lookup name may not be the first word after outputlookup if the command uses options like append or create_empty.

---
If this reply helps you, Karma would be appreciated.
0 Karma
Get Updates on the Splunk Community!

Technical Workshop Series: Splunk Data Management and SPL2 | Register here!

Hey, Splunk Community! Ready to take your data management skills to the next level? Join us for a 3-part ...

Spotting Financial Fraud in the Haystack: A Guide to Behavioral Analytics with Splunk

In today's digital financial ecosystem, security teams face an unprecedented challenge. The sheer volume of ...

Solve Problems Faster with New, Smarter AI and Integrations in Splunk Observability

Solve Problems Faster with New, Smarter AI and Integrations in Splunk Observability As businesses scale ...