Splunk Search

How to table out two string fields under one field/column?

FaridHamidi
Engager

 

 

| eval Alert_Message_DISK = status_disk.": Disk utilization for ".host." is ".total_disk_utilization."%"
| eval Alert_Message_DISKD = status_diskD.": Disk utilization for ".host." is ".disk_D."%"
| table Alert_Message

 

 


I want to put these two string fields created using "eval" under one "Alert_Message". thank you.

Labels (1)
0 Karma

ITWhisperer
SplunkTrust
SplunkTrust

You mean like this?

| eval Alert_Message=mvappend(Alert_Message_DISK,Alert_Message_DISKD)
0 Karma
Got questions? Get answers!

Join the Splunk Community Slack to learn, troubleshoot, and make connections with fellow Splunk practitioners in real time!

Meet up IRL or virtually!

Join Splunk User Groups to connect and learn in-person by region or remotely by topic or industry.

Get Updates on the Splunk Community!

Network to App: Observability Unlocked [May & June Series]

In today’s digital landscape, your environment is no longer confined to the data center. It spans complex ...

SPL2 Deep Dives, AppDynamics Integrations, SAML Made Simple and Much More on Splunk ...

Splunk Lantern is Splunk’s customer success center that provides practical guidance from Splunk experts on key ...

[Puzzles] Solve, Learn, Repeat: Matching cron expressions

This puzzle (first published here) is based on matching timestamps to cron expressions.All the timestamps ...