<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Use of == with or operator in Splunk Search</title>
    <link>https://community.splunk.com/t5/Splunk-Search/Use-of-with-or-operator/m-p/460430#M140123</link>
    <description>&lt;P&gt;I want to compare some data with fields and then rename the data matched with fields. Since we have large set of data and comparing of all those data with fields it makes query bulky. Can anyone give efficient code for this??&lt;/P&gt;
&lt;P&gt;Example: stats count(eval(fieldname=="some data" OR fieldname=="some data")) as XYZ count(eval(fieldname=="some data" OR fieldname=="some data" OR fieldname=="some data" fieldname=="some data" fieldname=="some data"fieldname=="some data"fieldname=="some data"fieldname=="some data"fieldname=="some data")) as ABC..............by fieldname&lt;/P&gt;
&lt;HR /&gt;</description>
    <pubDate>Fri, 05 Jun 2020 23:11:50 GMT</pubDate>
    <dc:creator>arabhi</dc:creator>
    <dc:date>2020-06-05T23:11:50Z</dc:date>
    <item>
      <title>Use of == with or operator</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Use-of-with-or-operator/m-p/460430#M140123</link>
      <description>&lt;P&gt;I want to compare some data with fields and then rename the data matched with fields. Since we have large set of data and comparing of all those data with fields it makes query bulky. Can anyone give efficient code for this??&lt;/P&gt;
&lt;P&gt;Example: stats count(eval(fieldname=="some data" OR fieldname=="some data")) as XYZ count(eval(fieldname=="some data" OR fieldname=="some data" OR fieldname=="some data" fieldname=="some data" fieldname=="some data"fieldname=="some data"fieldname=="some data"fieldname=="some data"fieldname=="some data")) as ABC..............by fieldname&lt;/P&gt;
&lt;HR /&gt;</description>
      <pubDate>Fri, 05 Jun 2020 23:11:50 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Use-of-with-or-operator/m-p/460430#M140123</guid>
      <dc:creator>arabhi</dc:creator>
      <dc:date>2020-06-05T23:11:50Z</dc:date>
    </item>
    <item>
      <title>Re: Use of == with or operator</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Use-of-with-or-operator/m-p/460431#M140124</link>
      <description>&lt;P&gt;make CSV for lookup and use &lt;CODE&gt;lookup&lt;/CODE&gt; command&lt;BR /&gt;
and aggregate the output &lt;/P&gt;</description>
      <pubDate>Sun, 24 May 2020 00:00:27 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Use-of-with-or-operator/m-p/460431#M140124</guid>
      <dc:creator>to4kawa</dc:creator>
      <dc:date>2020-05-24T00:00:27Z</dc:date>
    </item>
    <item>
      <title>Re: Use of == with or operator</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Use-of-with-or-operator/m-p/460432#M140125</link>
      <description>&lt;P&gt;Hello @arabhi,&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt; stats count(eval(fieldname IN ("value1", "value2", "value3"))) AS XYZ
&lt;/CODE&gt;&lt;/PRE&gt;</description>
      <pubDate>Sun, 24 May 2020 11:46:34 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Use-of-with-or-operator/m-p/460432#M140125</guid>
      <dc:creator>PavelP</dc:creator>
      <dc:date>2020-05-24T11:46:34Z</dc:date>
    </item>
  </channel>
</rss>

