Splunk® Enterprise

Search Reference

Download manual as PDF

Download topic as PDF



Expands the values of a multivalue field into separate events, one event for each value in the multivalue field. For each result, the mvexpand command creates a new result for every multivalue field.


mvexpand <field> [limit=<int>]

Required arguments

Syntax: <field>
Description: The name of a multivalue field.

Optional arguments

Syntax: limit=<int>
Description: Specify the number of values of <field> to use for each input event.
Default: 0, or no limit


You can use evaluation functions and statistical functions on multivalue fields or to return multivalue fields.


A limit exists on the amount of RAM that the mvexpand command is permitted to use while expanding a batch of results. By default the limit is 500MB. The input chunk of results is typically maxresults or smaller in size, and the expansion of all these results resides in memory at one time. The total necessary memory is the average result size multiplied by the number of results in the chunk multiplied by the average size of the multivalue field being expanded.

If this attempt exceeds the configured maximum on any chunk, the chunk is truncated and a warning message is emitted. If you have Splunk Enterprise, you can adjust the limit by editing the max_mem_usage_mb setting in the limits.conf file. If you have Splunk Cloud and encounter problems because of this limit, file a Support ticket.


Example 1:

Create new events for each value of multivalue field, "foo".

... | mvexpand foo

Example 2:

Create new events for the first 100 values of multivalue field, "foo".

... | mvexpand foo limit=100

Example 3:

The mvexpand command only works on one multivalue field. This example walks through how to expand an event with more than one multivalue field into individual events for each field value. For example, given these events, with sourcetype=data:

2012-10-01 00:11:23 a=22 b=21 a=23 b=32 a=51 b=24
2012-10-01 00:11:22 a=1 b=2 a=2 b=3 a=5 b=2

First, use the rex command to extract the field values for a and b. Then use the eval command and mvzip function to create a new field from the values of a and b.

sourcetype=data | rex field=_raw "a=(?<a>\d+)" max_match=5 | rex field=_raw "b=(?<b>\d+)" max_match=5 | eval fields = mvzip(a,b) | table _time fields

Mvexpand exampleP1.png

Use the mvexpand command and the rex command on the new field, fields, to create new events and extract the fields alpha and beta:

sourcetype=data | rex field=_raw "a=(?<a>\d+)" max_match=5 | rex field=_raw "b=(?<b>\d+)" max_match=5 | eval fields = mvzip(a,b) | mvexpand fields | rex field=fields "(?<alpha>\d+),(?<beta>\d+)" | table _time alpha beta

Use the table command to display only the _time, alpha, and beta fields in a results table: Mvexpand exampleP2.png

(Thanks to Splunk user Duncan for this example. You can see another version of this with JSON data and the spath command.)

See also


Multivalue eval functions
Multivalue stats and chart functions


Have questions? Visit Splunk Answers and see what questions and answers the Splunk community has using the mvexpand command.


This documentation applies to the following versions of Splunk® Enterprise: 6.6.2, 6.6.3, 6.6.4, 6.6.5, 7.0.0, 7.0.1

Was this documentation topic helpful?

Enter your email address, and someone from the documentation team will respond to you:

Please provide your comments here. Ask a question or make a suggestion.

You must be logged into splunk.com in order to post comments. Log in now.

Please try to keep this discussion focused on the content covered in this documentation topic. If you have a more general question about Splunk functionality or are experiencing a difficulty with Splunk, consider posting a question to Splunkbase Answers.

0 out of 1000 Characters