Splunk Search

In a search combine two-three field values(columns) into one field

man03359
Communicator

Hi,

I have an output like this -

LocationEventNameErrorCodeSummary
server1Mssql.LogBackupFailedBackupAgentErrorFailed backup....
server2Mssql.LogBackupFailedBackupAgentErrorFailed backup....

 

Now I am trying to combine all the values of Location, EventName, ErrorCode and Summary into one field called "newfield" , lets say using a comma "," or ";"

I am trying this command -

 

 

| eval newfield= mvappend(LocationName,EventName,ErrorCode,summary)

 

 

but the output it is giving is -  

server1
Mssql.LogBackupFailed
BackupAgentError
Failed backup....

 

Output I am expecting is -

server1,Mssql.LogBackupFailed,BackupAgentError,Failed backup
Labels (1)
Tags (1)
0 Karma

ITWhisperer
SplunkTrust
SplunkTrust
| eval newfield= mvjoin(mvappend(LocationName,EventName,ErrorCode,summary),",")
0 Karma

gcusello
SplunkTrust
SplunkTrust

Hi @man03359 ,

if you want the values of the fields separated by comma, you should use eval in this way:

| eval newfield=LocationName.",".EventName.",".ErrorCode.",".summary

Ciao.

Giuseppe

0 Karma
Get Updates on the Splunk Community!

Introducing the Splunk Community Dashboard Challenge!

Welcome to Splunk Community Dashboard Challenge! This is your chance to showcase your skills in creating ...

Wondering How to Build Resiliency in the Cloud?

IT leaders are choosing Splunk Cloud as an ideal cloud transformation platform to drive business resilience,  ...

Updated Data Management and AWS GDI Inventory in Splunk Observability

We’re making some changes to Data Management and Infrastructure Inventory for AWS. The Data Management page, ...