Splunk Search

How to extract Multivalue fields?

shrek
Engager

Lets just say I have multiple events like this:

names

John

Sam

Todd

favorite_colors

Blue

Yellow

Green

Each event might have a different number of field values but the ratio of names to favorite_colors is 1:1.

Is it possible to extract these into new events or display them separately in a table like this:

name favourite_color
John Blue
Sam Yellow
Todd Green

 

I have tried mvexpand but that only works for 1 multivalue field.

Labels (3)
Tags (1)
0 Karma
1 Solution

ITWhisperer
SplunkTrust
SplunkTrust

As you say, mvexpand works on one event, so there are a couple of ways to do it, here is one

| eval row=mvrange(0,mvcount(name))
| mvexpand row
| eval name=mvindex(name,row)
| eval favourite_colour=mvindex(favourite_colour,row)
| fields - row

View solution in original post

ITWhisperer
SplunkTrust
SplunkTrust

As you say, mvexpand works on one event, so there are a couple of ways to do it, here is one

| eval row=mvrange(0,mvcount(name))
| mvexpand row
| eval name=mvindex(name,row)
| eval favourite_colour=mvindex(favourite_colour,row)
| fields - row

shrek
Engager

This was exactly what I was looking for, thanks.

0 Karma
Get Updates on the Splunk Community!

Index This | When is October more than just the tenth month?

October 2025 Edition  Hayyy Splunk Education Enthusiasts and the Eternally Curious!   We’re back with this ...

Observe and Secure All Apps with Splunk

  Join Us for Our Next Tech Talk: Observe and Secure All Apps with SplunkAs organizations continue to innovate ...

What’s New & Next in Splunk SOAR

 Security teams today are dealing with more alerts, more tools, and more pressure than ever.  Join us for an ...