Splunk Search

How to edit my search to combine 2 rows to 1 row

AllenZhang
Explorer

My search string: sourcetype="AAA"|table _time event_iduser

Results:

9/10/2015 23:24 303 user1
9/10/2015 21:50 302 user1
9/10/2015 21:50 303 user2
9/10/2015 21:50 302 user2
9/10/2015 11:21 303 user3
9/10/2015 11:18 302 user3

Hope to get results as: sourcetype="AAA" .....|table user Time_302 Time_303

Usern       Time_302          Time_303
user1   9/10/2015 21:50    9/10/2015 23:24
user2   9/10/2015 21:50    9/10/2015 21:50
user3   9/10/2015 11:18    9/10/2015 11:21
0 Karma
1 Solution

somesoni2
SplunkTrust
SplunkTrust

Try something like this

sourcetype="AAA"|table _time event_id user | eval Time=strftime(_time,"%m/%d/%Y %H:%M") | chart values(TIme) over user by event_id limit=0

View solution in original post

0 Karma

somesoni2
SplunkTrust
SplunkTrust

Try something like this

sourcetype="AAA"|table _time event_id user | eval Time=strftime(_time,"%m/%d/%Y %H:%M") | chart values(TIme) over user by event_id limit=0
0 Karma

AllenZhang
Explorer

It works, great! Thanks a lot!
And, now I am hoping to make it better by adding a column, is it possible?

Originally:

9/10/2015 23:24 303 user1 info1
9/10/2015 21:50 302 user1 info1
9/10/2015 21:50 303 user2 info2
9/10/2015 21:50 302 user2 info2
9/10/2015 11:21 303 user3 info3
9/10/2015 11:18 302 user3 info3

I hope to see:

User info Time_302 Time_303
user1 info1 9/10/2015 21:50 9/10/2015 23:24
user2 info2 9/10/2015 21:50 9/10/2015 21:50
user3 info3 9/10/2015 11:18 9/10/2015 11:21

0 Karma

AllenZhang
Explorer

Thanks, but the results are like this:

User | Time_302 | Time_303
user1 | 9/10/2015 21:50 | 9/10/2015 21:50
| | 9/10/2015 23:24

Time_302 value were shown on both columns.

0 Karma

somesoni2
SplunkTrust
SplunkTrust

This could be due to a user has more than 1 event with an event_id. If there are multiple events for an event_id and you want the latest Time of it, they replace "| chart values" with "| chart latest"

0 Karma
Get Updates on the Splunk Community!

Routing logs with Splunk OTel Collector for Kubernetes

The Splunk Distribution of the OpenTelemetry (OTel) Collector is a product that provides a way to ingest ...

Welcome to the Splunk Community!

(view in My Videos) We're so glad you're here! The Splunk Community is place to connect, learn, give back, and ...

Tech Talk | Elevating Digital Service Excellence: The Synergy of Splunk RUM & APM

Elevating Digital Service Excellence: The Synergy of Real User Monitoring and Application Performance ...