Splunk Search

How to append the result of a search to values of a multivalued field?

buttsurfer
Path Finder

 

I have a SPL search that returns a field with multiple values (names of lookups). I want to concat the lookup name and it's origin app, found with the search below:

      | rest splunk_server=local /servicesNS/-/-/saved/searches | table title eai:acl.app eai:acl.owner search | where match(search,"outputlookup\s+lookupname")

 

Labels (2)
0 Karma

ITWhisperer
SplunkTrust
SplunkTrust

You could try something like this

| rex max_match=0 field=search "outputlookup\s+(?<lookup>.+)"
| eval lookups=mvjoin(mvappend(title,lookup)," ")
0 Karma

richgalloway
SplunkTrust
SplunkTrust

There are two problems with the query.  The first is the table command is removing the lookupname field so there is nothing for match to look for.  The second is Splunk has two concatenation operators: + and . (dot).  IME, dot works better.

| rest splunk_server=local /servicesNS/-/-/saved/searches 
| eval lookupname="incident_settings" 
| eval matchstring="outputlookup\s"+lookupname 
| table title eai:acl.app eai:acl.owner search lookupname 
| where match(search,"outputlookup\s" . lookupname)

A word of caution: the lookup name may not be the first word after outputlookup if the command uses options like append or create_empty.

---
If this reply helps you, Karma would be appreciated.
0 Karma
Get Updates on the Splunk Community!

Announcing Scheduled Export GA for Dashboard Studio

We're excited to announce the general availability of Scheduled Export for Dashboard Studio. Starting in ...

Extending Observability Content to Splunk Cloud

Watch Now!   In this Extending Observability Content to Splunk Cloud Tech Talk, you'll see how to leverage ...

More Control Over Your Monitoring Costs with Archived Metrics GA in US-AWS!

What if there was a way you could keep all the metrics data you need while saving on storage costs?This is now ...