<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: How do I change the value of a field if a condition occurs? in Splunk Search</title>
    <link>https://community.splunk.com/t5/Splunk-Search/How-do-I-change-the-value-of-a-field-if-a-condition-occurs/m-p/494866#M137927</link>
    <description>&lt;P&gt;How does Splunk know this has happened?&lt;/P&gt;</description>
    <pubDate>Thu, 07 May 2020 13:36:21 GMT</pubDate>
    <dc:creator>richgalloway</dc:creator>
    <dc:date>2020-05-07T13:36:21Z</dc:date>
    <item>
      <title>How do I change the value of a field if a condition occurs?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-do-I-change-the-value-of-a-field-if-a-condition-occurs/m-p/494865#M137926</link>
      <description>&lt;P&gt;Hi community!&lt;/P&gt;

&lt;P&gt;I'm using Splunk Entreprise to create dashboards with my client's ServiceNow incident information.&lt;/P&gt;

&lt;OL&gt;
&lt;LI&gt;My company &lt;STRONG&gt;&lt;EM&gt;only look at tickets from assignment_group A&lt;/EM&gt;&lt;/STRONG&gt;.&lt;/LI&gt;
&lt;LI&gt;So, I have a &lt;STRONG&gt;&lt;EM&gt;ticket X&lt;/EM&gt;&lt;/STRONG&gt; that belongs to &lt;STRONG&gt;&lt;EM&gt;assignment_group A&lt;/EM&gt;&lt;/STRONG&gt; with &lt;STRONG&gt;&lt;EM&gt;Status "New"&lt;/EM&gt;&lt;/STRONG&gt;.&lt;/LI&gt;
&lt;LI&gt;However, &lt;STRONG&gt;&lt;EM&gt;this ticket changed to assignment_group B&lt;/EM&gt;&lt;/STRONG&gt; and is no longer serviced by my company. &lt;STRONG&gt;This will result in a second ServiceNow extraction, that ticket will not appear&lt;/STRONG&gt;.&lt;/LI&gt;
&lt;/OL&gt;

&lt;P&gt;So, I need to create a logic so that &lt;STRONG&gt;&lt;EM&gt;when this happens, Splunk changes the Status of ticket X to "Reassigned"&lt;/EM&gt;&lt;/STRONG&gt;.&lt;/P&gt;

&lt;P&gt;Does anyone know how to do this?&lt;BR /&gt;
Thanks!&lt;/P&gt;</description>
      <pubDate>Thu, 07 May 2020 13:24:00 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-do-I-change-the-value-of-a-field-if-a-condition-occurs/m-p/494865#M137926</guid>
      <dc:creator>diogenesloazeve</dc:creator>
      <dc:date>2020-05-07T13:24:00Z</dc:date>
    </item>
    <item>
      <title>Re: How do I change the value of a field if a condition occurs?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-do-I-change-the-value-of-a-field-if-a-condition-occurs/m-p/494866#M137927</link>
      <description>&lt;P&gt;How does Splunk know this has happened?&lt;/P&gt;</description>
      <pubDate>Thu, 07 May 2020 13:36:21 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-do-I-change-the-value-of-a-field-if-a-condition-occurs/m-p/494866#M137927</guid>
      <dc:creator>richgalloway</dc:creator>
      <dc:date>2020-05-07T13:36:21Z</dc:date>
    </item>
    <item>
      <title>Re: How do I change the value of a field if a condition occurs?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-do-I-change-the-value-of-a-field-if-a-condition-occurs/m-p/494867#M137928</link>
      <description>&lt;P&gt;Hi richgalloway!&lt;/P&gt;

&lt;P&gt;The ticket X will already be in the index, as it entered as assignment_group A and Status New.&lt;BR /&gt;
However, as ticket X will not appear in the next ServiceNow extraction, Splunk should only change the Status to Reassigned.&lt;/P&gt;

&lt;P&gt;Is it possible to create such a rule?&lt;/P&gt;</description>
      <pubDate>Thu, 07 May 2020 14:17:24 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-do-I-change-the-value-of-a-field-if-a-condition-occurs/m-p/494867#M137928</guid>
      <dc:creator>diogenesloazeve</dc:creator>
      <dc:date>2020-05-07T14:17:24Z</dc:date>
    </item>
    <item>
      <title>Re: How do I change the value of a field if a condition occurs?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-do-I-change-the-value-of-a-field-if-a-condition-occurs/m-p/494868#M137929</link>
      <description>&lt;P&gt;I'm not sure my question was answered so I'll re-phrase it.  What data does Splunk see that tells it the ticket was re-assigned?&lt;/P&gt;</description>
      <pubDate>Thu, 07 May 2020 14:33:57 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-do-I-change-the-value-of-a-field-if-a-condition-occurs/m-p/494868#M137929</guid>
      <dc:creator>richgalloway</dc:creator>
      <dc:date>2020-05-07T14:33:57Z</dc:date>
    </item>
    <item>
      <title>Re: How do I change the value of a field if a condition occurs?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-do-I-change-the-value-of-a-field-if-a-condition-occurs/m-p/494869#M137930</link>
      <description>&lt;P&gt;In fact, there is no field to indicate this.&lt;BR /&gt;
Basically, if I have a ticket in the index and it no longer appears in the new extractions, it must change the status to reassigned&lt;/P&gt;</description>
      <pubDate>Thu, 07 May 2020 14:39:47 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-do-I-change-the-value-of-a-field-if-a-condition-occurs/m-p/494869#M137930</guid>
      <dc:creator>diogenesloazeve</dc:creator>
      <dc:date>2020-05-07T14:39:47Z</dc:date>
    </item>
    <item>
      <title>Re: How do I change the value of a field if a condition occurs?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-do-I-change-the-value-of-a-field-if-a-condition-occurs/m-p/494870#M137931</link>
      <description>&lt;P&gt;so, will Splunk know that there has been an extraction that does not contain this incident? For instance, can you find the most recent extraction date, and if there is no record for that incident with that extraction date, then create a new record with the  status as "reassigned"?&lt;/P&gt;</description>
      <pubDate>Thu, 07 May 2020 14:45:08 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-do-I-change-the-value-of-a-field-if-a-condition-occurs/m-p/494870#M137931</guid>
      <dc:creator>DalJeanis</dc:creator>
      <dc:date>2020-05-07T14:45:08Z</dc:date>
    </item>
    <item>
      <title>Re: How do I change the value of a field if a condition occurs?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-do-I-change-the-value-of-a-field-if-a-condition-occurs/m-p/494871#M137932</link>
      <description>&lt;P&gt;Still not clear on the detection method, but I want to ask: Do you expect the change the indexed data to reflect the new status?  If so, that is not possible.  Splunk does not allow indexed data to be changed at all.&lt;/P&gt;</description>
      <pubDate>Thu, 07 May 2020 14:59:52 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-do-I-change-the-value-of-a-field-if-a-condition-occurs/m-p/494871#M137932</guid>
      <dc:creator>richgalloway</dc:creator>
      <dc:date>2020-05-07T14:59:52Z</dc:date>
    </item>
    <item>
      <title>Re: How do I change the value of a field if a condition occurs?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-do-I-change-the-value-of-a-field-if-a-condition-occurs/m-p/494872#M137933</link>
      <description>&lt;P&gt;Understood. So is there a way that when this happens, Splunk will create a new ticket with the same information and just change the status to reassigned?&lt;/P&gt;</description>
      <pubDate>Thu, 07 May 2020 16:57:51 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-do-I-change-the-value-of-a-field-if-a-condition-occurs/m-p/494872#M137933</guid>
      <dc:creator>diogenesloazeve</dc:creator>
      <dc:date>2020-05-07T16:57:51Z</dc:date>
    </item>
    <item>
      <title>Re: How do I change the value of a field if a condition occurs?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-do-I-change-the-value-of-a-field-if-a-condition-occurs/m-p/494873#M137934</link>
      <description>&lt;P&gt;And we're back to where we started.  "when this happens" really needs to be a discrete event that Splunk can detect and then act on.&lt;/P&gt;</description>
      <pubDate>Thu, 07 May 2020 17:01:40 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-do-I-change-the-value-of-a-field-if-a-condition-occurs/m-p/494873#M137934</guid>
      <dc:creator>richgalloway</dc:creator>
      <dc:date>2020-05-07T17:01:40Z</dc:date>
    </item>
    <item>
      <title>Re: How do I change the value of a field if a condition occurs?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-do-I-change-the-value-of-a-field-if-a-condition-occurs/m-p/494874#M137935</link>
      <description>&lt;P&gt;And is there a way to make Splunk detect an event like this?&lt;/P&gt;</description>
      <pubDate>Thu, 07 May 2020 17:05:12 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-do-I-change-the-value-of-a-field-if-a-condition-occurs/m-p/494874#M137935</guid>
      <dc:creator>diogenesloazeve</dc:creator>
      <dc:date>2020-05-07T17:05:12Z</dc:date>
    </item>
    <item>
      <title>Re: How do I change the value of a field if a condition occurs?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-do-I-change-the-value-of-a-field-if-a-condition-occurs/m-p/494875#M137936</link>
      <description>&lt;P&gt;That's what Rich is asking. my friend. Helping to clarify his question more, when the incident, let's name it &lt;CODE&gt;INC001&lt;/CODE&gt; for our example,  gets reassigned from &lt;STRONG&gt;assignment_group A&lt;/STRONG&gt; to &lt;STRONG&gt;assignment_group B&lt;/STRONG&gt; in ServiceNow, does ServiceNow send some sort of event to Splunk, saying that &lt;CODE&gt;INC001&lt;/CODE&gt; has been reassigned to a new group? If so, only then we can conjure up some SPL to help you change the assignment. If not, then it's not possible, cos there's no other way for Splunk to know if the assignment group of the Incident was changed.&lt;/P&gt;

&lt;P&gt;Hope this helps you to clarify the doubts here.&lt;/P&gt;</description>
      <pubDate>Thu, 07 May 2020 17:42:47 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-do-I-change-the-value-of-a-field-if-a-condition-occurs/m-p/494875#M137936</guid>
      <dc:creator>shivanshu1593</dc:creator>
      <dc:date>2020-05-07T17:42:47Z</dc:date>
    </item>
  </channel>
</rss>

