Splunk Search

In a search combine two-three field values(columns) into one field

man03359
Communicator

Hi,

I have an output like this -

LocationEventNameErrorCodeSummary
server1Mssql.LogBackupFailedBackupAgentErrorFailed backup....
server2Mssql.LogBackupFailedBackupAgentErrorFailed backup....

 

Now I am trying to combine all the values of Location, EventName, ErrorCode and Summary into one field called "newfield" , lets say using a comma "," or ";"

I am trying this command -

 

 

| eval newfield= mvappend(LocationName,EventName,ErrorCode,summary)

 

 

but the output it is giving is -  

server1
Mssql.LogBackupFailed
BackupAgentError
Failed backup....

 

Output I am expecting is -

server1,Mssql.LogBackupFailed,BackupAgentError,Failed backup
Labels (1)
Tags (1)
0 Karma

ITWhisperer
SplunkTrust
SplunkTrust
| eval newfield= mvjoin(mvappend(LocationName,EventName,ErrorCode,summary),",")
0 Karma

gcusello
SplunkTrust
SplunkTrust

Hi @man03359 ,

if you want the values of the fields separated by comma, you should use eval in this way:

| eval newfield=LocationName.",".EventName.",".ErrorCode.",".summary

Ciao.

Giuseppe

0 Karma
Get Updates on the Splunk Community!

Automatic Discovery Part 1: What is Automatic Discovery in Splunk Observability Cloud ...

If you’ve ever deployed a new database cluster, spun up a caching layer, or added a load balancer, you know it ...

Real-Time Fraud Detection: How Splunk Dashboards Protect Financial Institutions

Financial fraud isn't slowing down. If anything, it's getting more sophisticated. Account takeovers, credit ...

Splunk + ThousandEyes: Correlate frontend, app, and network data to troubleshoot ...

 Are you tired of troubleshooting delays caused by siloed frontend, application, and network data? We've got a ...