Splunk Search

Multi-value field grouping

boffhead
New Member

Hi,

I'm sending AWS SSM patching logs to splunk.  I'm transforming these via a Lambda and getting the following events: (snipped for brevity)

 

 

{
   <SNIP>
   missing_count: 0
   not_applicable_count: 1762
   operation_end_time: 2021-05-18T16:08:27.1678125Z
   operation_start_time: 2021-05-18T16:00:29.0000000Z
   operation_type: Install
   other_non_compliant_count: 0
   owner_information:
   patch_group: test-grp6-wed
   patches: [
     [
       KB5001879
       Yes
       Success
     ]
     [
       KB890830
       Yes
       Success
     ]
   ]
}

 

 

 
What I'm after is table selected fields like server name, start/finish times etc. and to get the patches column in the format (space or comma seperated on 2 lines with the same row as the rest of the row for that server)
KB5001879, Yes, Success
KB890830, Yes, Success

I can extract the field using the following:
index="aws" sourcetype="aws:ssmpatchinglogs"
| spath patches{}{} output=patches

I've tried some things with mvexpand, streamstats and mvindex (which didn't recognise the command - we're on splunk Version:8.0.1 Build:6db836e2fb9e).

Cheers

Labels (1)
0 Karma
Get Updates on the Splunk Community!

Automatic Discovery Part 1: What is Automatic Discovery in Splunk Observability Cloud ...

If you’ve ever deployed a new database cluster, spun up a caching layer, or added a load balancer, you know it ...

Real-Time Fraud Detection: How Splunk Dashboards Protect Financial Institutions

Financial fraud isn't slowing down. If anything, it's getting more sophisticated. Account takeovers, credit ...

Splunk + ThousandEyes: Correlate frontend, app, and network data to troubleshoot ...

 Are you tired of troubleshooting delays caused by siloed frontend, application, and network data? We've got a ...