Splunk Search

How to split a table-formatted event into multiple events during search time?

davidcraven02
Communicator

Is it possible to have each piece of software as an event of its own so that I could search for a particular item?

Could some cool regex break this up into searchable data?

Desired output in screenshot below

alt text

Tags (2)
0 Karma
1 Solution

Yunagi
Communicator

To split a table-formatted event into multipe events during search time, you can use the multikv command.

Try it like this:

your search | multikv

You should get an event for each line. Each event should have the fields NAME, VERSION, RELEASE etc.

View solution in original post

Yunagi
Communicator

To split a table-formatted event into multipe events during search time, you can use the multikv command.

Try it like this:

your search | multikv

You should get an event for each line. Each event should have the fields NAME, VERSION, RELEASE etc.

davidcraven02
Communicator

Thank you so much

0 Karma
Get Updates on the Splunk Community!

Stronger Security with Federated Search for S3, GCP SQL & Australian Threat ...

Splunk Lantern is a Splunk customer success center that provides advice from Splunk experts on valuable data ...

Accelerating Observability as Code with the Splunk AI Assistant

We’ve seen in previous posts what Observability as Code (OaC) is and how it’s now essential for managing ...

Integrating Splunk Search API and Quarto to Create Reproducible Investigation ...

 Splunk is More Than Just the Web Console For Digital Forensics and Incident Response (DFIR) practitioners, ...