Splunk Search

In a search combine two-three field values(columns) into one field

man03359
Communicator

Hi,

I have an output like this -

LocationEventNameErrorCodeSummary
server1Mssql.LogBackupFailedBackupAgentErrorFailed backup....
server2Mssql.LogBackupFailedBackupAgentErrorFailed backup....

 

Now I am trying to combine all the values of Location, EventName, ErrorCode and Summary into one field called "newfield" , lets say using a comma "," or ";"

I am trying this command -

 

 

| eval newfield= mvappend(LocationName,EventName,ErrorCode,summary)

 

 

but the output it is giving is -  

server1
Mssql.LogBackupFailed
BackupAgentError
Failed backup....

 

Output I am expecting is -

server1,Mssql.LogBackupFailed,BackupAgentError,Failed backup
Labels (1)
Tags (1)
0 Karma

ITWhisperer
SplunkTrust
SplunkTrust
| eval newfield= mvjoin(mvappend(LocationName,EventName,ErrorCode,summary),",")
0 Karma

gcusello
SplunkTrust
SplunkTrust

Hi @man03359 ,

if you want the values of the fields separated by comma, you should use eval in this way:

| eval newfield=LocationName.",".EventName.",".ErrorCode.",".summary

Ciao.

Giuseppe

0 Karma
Get Updates on the Splunk Community!

Observability Unlocked: Kubernetes Monitoring with Splunk Observability Cloud

  Ready to master Kubernetes and cloud monitoring like the pros?Join Splunk’s Growth Engineering team for an ...

Wrapping Up Cybersecurity Awareness Month

October might be wrapping up, but for Splunk Education, cybersecurity awareness never goes out of season. ...

🌟 From Audit Chaos to Clarity: Welcoming Audit Trail v2

🗣 You Spoke, We Listened  Audit Trail v2 wasn’t written in isolation—it was shaped by your voices.  In ...