<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Splunk 7.2.0 - Field Aliases incorrect behavior in Splunk Dev</title>
    <link>https://community.splunk.com/t5/Splunk-Dev/Splunk-7-2-0-Field-Aliases-incorrect-behavior/m-p/437323#M7889</link>
    <description>&lt;P&gt;Thanks for this - We have just found the same issue. Oh joy!&lt;/P&gt;</description>
    <pubDate>Fri, 08 Feb 2019 02:21:13 GMT</pubDate>
    <dc:creator>Melstrathdee</dc:creator>
    <dc:date>2019-02-08T02:21:13Z</dc:date>
    <item>
      <title>Splunk 7.2.0 - Field Aliases incorrect behavior</title>
      <link>https://community.splunk.com/t5/Splunk-Dev/Splunk-7-2-0-Field-Aliases-incorrect-behavior/m-p/437319#M7885</link>
      <description>&lt;P&gt;Hi,&lt;BR /&gt;
I checked my app on version 7.2.0 and I found incorrect behavior.&lt;BR /&gt;
I exported my log file both to Splunk Enterprise 7.1.2 and 7.2.0.&lt;BR /&gt;
In version 7.1.2 everything works as expected but in 7.2.0 I noticed that for some reason (which I really have no idea) one field inside the log ("action") is missing from extracted fields.&lt;BR /&gt;
The method for extracting fields is regex based on key-value pairs.&lt;/P&gt;

&lt;P&gt;The mapping was not changed at all and the app is exactly the same.&lt;BR /&gt;
When I add another field aliases from the missing field into new filed ("action_test"), I can see the new field in the extracted fields on search view but not the original field.&lt;/P&gt;

&lt;P&gt;Is anyone have any idea about it?&lt;/P&gt;

&lt;P&gt;Thank you&lt;/P&gt;</description>
      <pubDate>Thu, 18 Oct 2018 04:36:26 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Dev/Splunk-7-2-0-Field-Aliases-incorrect-behavior/m-p/437319#M7885</guid>
      <dc:creator>shayhibah</dc:creator>
      <dc:date>2018-10-18T04:36:26Z</dc:date>
    </item>
    <item>
      <title>Re: Splunk 7.2.0 - Field Aliases incorrect behavior</title>
      <link>https://community.splunk.com/t5/Splunk-Dev/Splunk-7-2-0-Field-Aliases-incorrect-behavior/m-p/437320#M7886</link>
      <description>&lt;P&gt;FIELDALIAS behavior change in 7.2:&lt;BR /&gt;
FIELDALIAS for a specific field overwrites the field value, regardless of whether it is NULL or not. In earlier versions, FIELDALIAS did NOT overwrite the value in case of NULL.&lt;/P&gt;

&lt;P&gt;Solution to this is to use COALESCE:&lt;/P&gt;

&lt;P&gt;FIELDALIAS-s_computername = s_computername as host&lt;BR /&gt;
should be something like &lt;BR /&gt;
EVAL-host=coalesce(s_computername, host)&lt;/P&gt;</description>
      <pubDate>Tue, 29 Sep 2020 21:56:51 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Dev/Splunk-7-2-0-Field-Aliases-incorrect-behavior/m-p/437320#M7886</guid>
      <dc:creator>mreynov_splunk</dc:creator>
      <dc:date>2020-09-29T21:56:51Z</dc:date>
    </item>
    <item>
      <title>Re: Splunk 7.2.0 - Field Aliases incorrect behavior</title>
      <link>https://community.splunk.com/t5/Splunk-Dev/Splunk-7-2-0-Field-Aliases-incorrect-behavior/m-p/437321#M7887</link>
      <description>&lt;P&gt;This is not the same, and can cause other problems "down stream". If for example you use that alias field in a EVAL you can not do that anymore.&lt;BR /&gt;
The below (super simplified) example will not work anymore:&lt;/P&gt;

&lt;P&gt;_raw data1: "2018-12-06 15:54:00 Account_Name=arnold sid=123 message=bla" &lt;BR /&gt;
_raw data2: "2018-12-06 15:54:00 user=arnold sid=123 message=bla" &lt;/P&gt;

&lt;P&gt;FIELDALIAS-user = user AS Account_Name&lt;BR /&gt;
EVAL-userid = case(isnotnull(user),user, isnotnull(sid),sid)&lt;/P&gt;

&lt;P&gt;in data1 you will miss the Account_Name field even though it is in the data, this cannot be solved with evals in this manner:&lt;BR /&gt;
EVAL-user = coalesce(Account_Name, user)&lt;BR /&gt;
EVAL-userid = case(isnotnull(user),user, isnotnull(sid),sid)&lt;/P&gt;

&lt;P&gt;Because according to the props.conf spec file:&lt;BR /&gt;
* When multiple EVAL-* statements are specified, they behave as if they are run in parallel, rather than in any particular sequence.&lt;BR /&gt;
* For example say you have two statements: EVAL-x = y*2 and EVAL-y=100. In this case, "x" will be assigned the original value of "y * 2," not the value of "y" after it is set to 100.&lt;/P&gt;

&lt;P&gt;So in my opinion this is a major breaking change in the way 7.2.x works, and there is no mentioning of it in any doc (spec file/release notes/known issues/.....)&lt;/P&gt;</description>
      <pubDate>Tue, 29 Sep 2020 22:21:48 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Dev/Splunk-7-2-0-Field-Aliases-incorrect-behavior/m-p/437321#M7887</guid>
      <dc:creator>aholzel</dc:creator>
      <dc:date>2020-09-29T22:21:48Z</dc:date>
    </item>
    <item>
      <title>Re: Splunk 7.2.0 - Field Aliases incorrect behavior</title>
      <link>https://community.splunk.com/t5/Splunk-Dev/Splunk-7-2-0-Field-Aliases-incorrect-behavior/m-p/437322#M7888</link>
      <description>&lt;P&gt;Found a similar problem in the Splunk_TA_microsoft-iis app.&lt;BR /&gt;
In the default props.conf they do this:&lt;/P&gt;

&lt;BLOCKQUOTE&gt;
&lt;PRE&gt;&lt;CODE&gt;FIELDALIAS-s_computername = s_computername as host
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;If s_computername is not found in the event, I no longer have a host field in my event.&lt;/P&gt;
&lt;/BLOCKQUOTE&gt;

&lt;P&gt;This behavior popped up after the upgrade from 6.5 to 7.2.&lt;BR /&gt;
Disabling this alias does the trick for me because all events come from a forwarder on the server itself, so I did an overwrite of the alias in the local folder like this:&lt;/P&gt;

&lt;BLOCKQUOTE&gt;
&lt;PRE&gt;&lt;CODE&gt;FIELDALIAS-s_computername =
&lt;/CODE&gt;&lt;/PRE&gt;
&lt;/BLOCKQUOTE&gt;</description>
      <pubDate>Tue, 29 Sep 2020 22:55:11 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Dev/Splunk-7-2-0-Field-Aliases-incorrect-behavior/m-p/437322#M7888</guid>
      <dc:creator>deangoris</dc:creator>
      <dc:date>2020-09-29T22:55:11Z</dc:date>
    </item>
    <item>
      <title>Re: Splunk 7.2.0 - Field Aliases incorrect behavior</title>
      <link>https://community.splunk.com/t5/Splunk-Dev/Splunk-7-2-0-Field-Aliases-incorrect-behavior/m-p/437323#M7889</link>
      <description>&lt;P&gt;Thanks for this - We have just found the same issue. Oh joy!&lt;/P&gt;</description>
      <pubDate>Fri, 08 Feb 2019 02:21:13 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Dev/Splunk-7-2-0-Field-Aliases-incorrect-behavior/m-p/437323#M7889</guid>
      <dc:creator>Melstrathdee</dc:creator>
      <dc:date>2019-02-08T02:21:13Z</dc:date>
    </item>
    <item>
      <title>Re: Splunk 7.2.0 - Field Aliases incorrect behavior</title>
      <link>https://community.splunk.com/t5/Splunk-Dev/Splunk-7-2-0-Field-Aliases-incorrect-behavior/m-p/437324#M7890</link>
      <description>&lt;P&gt;Hi there, we had the same issue ever since we jumped into 7.2.3 from 7.0.3. For an example on Proxy TA props.conf we had aliases configured such as below. &lt;/P&gt;

&lt;P&gt;FIELDALIAS-http_referrer    = cs_Referer as http_referrer&lt;BR /&gt;
FIELDALIAS-user_agent       = cs_User_Agent as http_user_agent&lt;/P&gt;

&lt;P&gt;But on transforms.conf had the field alias instead of the actual field name - something like below. &lt;/P&gt;

&lt;P&gt;REGEX = (?\d{4}-\d{2}-\d{2})\s+(?[^\s]+) ... (?-|\S+)\  ... (?\S+) ...&lt;/P&gt;

&lt;P&gt;By changing the RegEx to actual field name was fixed this issue and Splunk support will update their release notes under SPL-166565 stating that the field extraction is more restrictive on 7.2.3.&lt;/P&gt;</description>
      <pubDate>Tue, 29 Sep 2020 23:17:48 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Dev/Splunk-7-2-0-Field-Aliases-incorrect-behavior/m-p/437324#M7890</guid>
      <dc:creator>dwickram</dc:creator>
      <dc:date>2020-09-29T23:17:48Z</dc:date>
    </item>
    <item>
      <title>Re: Splunk 7.2.0 - Field Aliases incorrect behavior</title>
      <link>https://community.splunk.com/t5/Splunk-Dev/Splunk-7-2-0-Field-Aliases-incorrect-behavior/m-p/437325#M7891</link>
      <description>&lt;P&gt;Do you mean to say to use the coalesce in place of the fieldalias definition?&lt;/P&gt;</description>
      <pubDate>Fri, 06 Dec 2019 17:06:45 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Dev/Splunk-7-2-0-Field-Aliases-incorrect-behavior/m-p/437325#M7891</guid>
      <dc:creator>sarmstrong_splu</dc:creator>
      <dc:date>2019-12-06T17:06:45Z</dc:date>
    </item>
  </channel>
</rss>

