Splunk Search

How to append the result of a search to values of a multivalued field?

buttsurfer
Path Finder

 

I have a SPL search that returns a field with multiple values (names of lookups). I want to concat the lookup name and it's origin app, found with the search below:

      | rest splunk_server=local /servicesNS/-/-/saved/searches | table title eai:acl.app eai:acl.owner search | where match(search,"outputlookup\s+lookupname")

 

Labels (2)
0 Karma

ITWhisperer
SplunkTrust
SplunkTrust

You could try something like this

| rex max_match=0 field=search "outputlookup\s+(?<lookup>.+)"
| eval lookups=mvjoin(mvappend(title,lookup)," ")
0 Karma

richgalloway
SplunkTrust
SplunkTrust

There are two problems with the query.  The first is the table command is removing the lookupname field so there is nothing for match to look for.  The second is Splunk has two concatenation operators: + and . (dot).  IME, dot works better.

| rest splunk_server=local /servicesNS/-/-/saved/searches 
| eval lookupname="incident_settings" 
| eval matchstring="outputlookup\s"+lookupname 
| table title eai:acl.app eai:acl.owner search lookupname 
| where match(search,"outputlookup\s" . lookupname)

A word of caution: the lookup name may not be the first word after outputlookup if the command uses options like append or create_empty.

---
If this reply helps you, Karma would be appreciated.
0 Karma
Get Updates on the Splunk Community!

Introducing the Splunk Community Dashboard Challenge!

Welcome to Splunk Community Dashboard Challenge! This is your chance to showcase your skills in creating ...

Get the T-shirt to Prove You Survived Splunk University Bootcamp

As if Splunk University, in Las Vegas, in-person, with three days of bootcamps and labs weren’t enough, now ...

Wondering How to Build Resiliency in the Cloud?

IT leaders are choosing Splunk Cloud as an ideal cloud transformation platform to drive business resilience,  ...