Splunk Search

Why isn't table column formatting working for some rows in the following search?

ddelapasse
Explorer

Can anyone tell me why coloring on these true/false values is not working for all the rows?

alt text

Tags (1)
0 Karma
1 Solution

woodcock
Esteemed Legend

The problem is that your fields are multi-valued. Add this to the end of your search and it should work fine:

| foreach streamMissing shouldBeRecording [ eval <<FIELD>> = mvdedup(<<FIELD>>) ]

View solution in original post

0 Karma

woodcock
Esteemed Legend

The problem is that your fields are multi-valued. Add this to the end of your search and it should work fine:

| foreach streamMissing shouldBeRecording [ eval <<FIELD>> = mvdedup(<<FIELD>>) ]
0 Karma

ddelapasse
Explorer

Worked perfectly. Thanks very much!

0 Karma

wagnerlucena
Explorer

Are you using table or stats command in your search ?
It is not working because there is 2 values in one unique row. I mean, the Splunk will only color the value if the value match exactly true or false, not False False or True True in same line. If you are using table commands to show the results, you will need to change to stats command.

0 Karma
Get Updates on the Splunk Community!

Tech Talk Recap | Mastering Threat Hunting

Mastering Threat HuntingDive into the world of threat hunting, exploring the key differences between ...

Observability for AI Applications: Troubleshooting Latency

If you’re working with proprietary company data, you’re probably going to have a locally hosted LLM or many ...

Splunk AI Assistant for SPL vs. ChatGPT: Which One is Better?

In the age of AI, every tool promises to make our lives easier. From summarizing content to writing code, ...