Splunk Search

In a search combine two-three field values(columns) into one field

man03359
Communicator

Hi,

I have an output like this -

LocationEventNameErrorCodeSummary
server1Mssql.LogBackupFailedBackupAgentErrorFailed backup....
server2Mssql.LogBackupFailedBackupAgentErrorFailed backup....

 

Now I am trying to combine all the values of Location, EventName, ErrorCode and Summary into one field called "newfield" , lets say using a comma "," or ";"

I am trying this command -

 

 

| eval newfield= mvappend(LocationName,EventName,ErrorCode,summary)

 

 

but the output it is giving is -  

server1
Mssql.LogBackupFailed
BackupAgentError
Failed backup....

 

Output I am expecting is -

server1,Mssql.LogBackupFailed,BackupAgentError,Failed backup
Labels (1)
Tags (1)
0 Karma

ITWhisperer
SplunkTrust
SplunkTrust
| eval newfield= mvjoin(mvappend(LocationName,EventName,ErrorCode,summary),",")
0 Karma

gcusello
SplunkTrust
SplunkTrust

Hi @man03359 ,

if you want the values of the fields separated by comma, you should use eval in this way:

| eval newfield=LocationName.",".EventName.",".ErrorCode.",".summary

Ciao.

Giuseppe

0 Karma
Get Updates on the Splunk Community!

Accelerating Observability as Code with the Splunk AI Assistant

We’ve seen in previous posts what Observability as Code (OaC) is and how it’s now essential for managing ...

Integrating Splunk Search API and Quarto to Create Reproducible Investigation ...

 Splunk is More Than Just the Web Console For Digital Forensics and Incident Response (DFIR) practitioners, ...

Congratulations to the 2025-2026 SplunkTrust!

Hello, Splunk Community! We are beyond thrilled to announce our newest group of SplunkTrust members!  The ...