Splunk Search

How to group each full iteration into single fields?

ABSplunker93
Engager

I have a stats table with output in the below format:

Device                          Timestamp        Action

some value                some value.             1

some value              some value.              2

..                     ..                                .. 

some value                some value              10

some value                 some value               1

some value              some value.                  2

..                     ..                                .. 

some value                some value              10

 

So, the action column repeats the pattern after a certain number of iterations. How to group these into single fields, that is, each full iteration should be stored as a mv field.

 

Labels (1)
0 Karma

richgalloway
SplunkTrust
SplunkTrust

The stats command doesn't create arbitrary patterns the results.  Either the pattern exists in the data or it's introduced in the query.  You may need to add or change the by clause in the stats command.  For more specifics, please share the SPL and a sanitized data sample.

---
If this reply helps you, Karma would be appreciated.
0 Karma
Get Updates on the Splunk Community!

Building Reliable Asset and Identity Frameworks in Splunk ES

 Accurate asset and identity resolution is the backbone of security operations. Without it, alerts are ...

Cloud Monitoring Console - Unlocking Greater Visibility in SVC Usage Reporting

For Splunk Cloud customers, understanding and optimizing Splunk Virtual Compute (SVC) usage and resource ...

Automatic Discovery Part 3: Practical Use Cases

If you’ve enabled Automatic Discovery in your install of the Splunk Distribution of the OpenTelemetry ...