Splunk Search

Multi-value field grouping

boffhead
New Member

Hi,

I'm sending AWS SSM patching logs to splunk.  I'm transforming these via a Lambda and getting the following events: (snipped for brevity)

 

 

{
   <SNIP>
   missing_count: 0
   not_applicable_count: 1762
   operation_end_time: 2021-05-18T16:08:27.1678125Z
   operation_start_time: 2021-05-18T16:00:29.0000000Z
   operation_type: Install
   other_non_compliant_count: 0
   owner_information:
   patch_group: test-grp6-wed
   patches: [
     [
       KB5001879
       Yes
       Success
     ]
     [
       KB890830
       Yes
       Success
     ]
   ]
}

 

 

 
What I'm after is table selected fields like server name, start/finish times etc. and to get the patches column in the format (space or comma seperated on 2 lines with the same row as the rest of the row for that server)
KB5001879, Yes, Success
KB890830, Yes, Success

I can extract the field using the following:
index="aws" sourcetype="aws:ssmpatchinglogs"
| spath patches{}{} output=patches

I've tried some things with mvexpand, streamstats and mvindex (which didn't recognise the command - we're on splunk Version:8.0.1 Build:6db836e2fb9e).

Cheers

Labels (1)
0 Karma
Get Updates on the Splunk Community!

Data Management Digest – December 2025

Welcome to the December edition of Data Management Digest! As we continue our journey of data innovation, the ...

Index This | What is broken 80% of the time by February?

December 2025 Edition   Hayyy Splunk Education Enthusiasts and the Eternally Curious!    We’re back with this ...

Unlock Faster Time-to-Value on Edge and Ingest Processor with New SPL2 Pipeline ...

Hello Splunk Community,   We're thrilled to share an exciting update that will help you manage your data more ...