Splunk Search

In a search combine two-three field values(columns) into one field

man03359
Communicator

Hi,

I have an output like this -

LocationEventNameErrorCodeSummary
server1Mssql.LogBackupFailedBackupAgentErrorFailed backup....
server2Mssql.LogBackupFailedBackupAgentErrorFailed backup....

 

Now I am trying to combine all the values of Location, EventName, ErrorCode and Summary into one field called "newfield" , lets say using a comma "," or ";"

I am trying this command -

 

 

| eval newfield= mvappend(LocationName,EventName,ErrorCode,summary)

 

 

but the output it is giving is -  

server1
Mssql.LogBackupFailed
BackupAgentError
Failed backup....

 

Output I am expecting is -

server1,Mssql.LogBackupFailed,BackupAgentError,Failed backup
Labels (1)
Tags (1)
0 Karma

ITWhisperer
SplunkTrust
SplunkTrust
| eval newfield= mvjoin(mvappend(LocationName,EventName,ErrorCode,summary),",")
0 Karma

gcusello
SplunkTrust
SplunkTrust

Hi @man03359 ,

if you want the values of the fields separated by comma, you should use eval in this way:

| eval newfield=LocationName.",".EventName.",".ErrorCode.",".summary

Ciao.

Giuseppe

0 Karma
Get Updates on the Splunk Community!

Splunk Mobile: Your Brand-New Home Screen

Meet Your New Mobile Hub  Hello Splunk Community!  Staying connected to your data—no matter where you are—is ...

Introducing Value Insights (Beta): Understand the Business Impact your organization ...

Real progress on your strategic priorities starts with knowing the business outcomes your teams are delivering ...

Enterprise Security (ES) Essentials 8.3 is Now GA — Smarter Detections, Faster ...

As of today, Enterprise Security (ES) Essentials 8.3 is now generally available, helping SOC teams simplify ...