<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Adding field to event without altering existing field in Splunk Search</title>
    <link>https://community.splunk.com/t5/Splunk-Search/Adding-field-to-event-without-altering-existing-field/m-p/548563#M155606</link>
    <description>&lt;LI-CODE lang="markup"&gt;eval ISSUER_NAME = if(isnull(ISSUER_NAME),if(TXN="33","XXX","N/A"),ISSUER_NAME)&lt;/LI-CODE&gt;&lt;P&gt;or&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;eval ISSUER_NAME = coalesce(ISSUER_NAME, if(TXN="33","XXX","N/A"))&lt;/LI-CODE&gt;</description>
    <pubDate>Tue, 20 Apr 2021 10:04:00 GMT</pubDate>
    <dc:creator>ITWhisperer</dc:creator>
    <dc:date>2021-04-20T10:04:00Z</dc:date>
    <item>
      <title>Adding field to event without altering existing field</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Adding-field-to-event-without-altering-existing-field/m-p/548560#M155605</link>
      <description>&lt;P&gt;I have an index that have a field called ISSUER_NAME, but now we have a new set of events (different log structure) that don't have that ISSUER_NAME but identify by another field. I want to add ISSUER_NAME to that specific event. I tried&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;eval ISSUER_NAME = if(TXN="33","XXX",ISSUER_NAME)&lt;/LI-CODE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;In which, TXN="33" is the identifier to those events, XXX is the content of the ISSUER_NAME I want to give to said events, which they don't have. But if I do that, the ISSUER_NAME of old events structure return NULL. I want to ask, is there a way to add field to events without altering existing field?&lt;BR /&gt;Thank you.&lt;/P&gt;</description>
      <pubDate>Tue, 20 Apr 2021 09:53:24 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Adding-field-to-event-without-altering-existing-field/m-p/548560#M155605</guid>
      <dc:creator>phamxuantung</dc:creator>
      <dc:date>2021-04-20T09:53:24Z</dc:date>
    </item>
    <item>
      <title>Re: Adding field to event without altering existing field</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Adding-field-to-event-without-altering-existing-field/m-p/548563#M155606</link>
      <description>&lt;LI-CODE lang="markup"&gt;eval ISSUER_NAME = if(isnull(ISSUER_NAME),if(TXN="33","XXX","N/A"),ISSUER_NAME)&lt;/LI-CODE&gt;&lt;P&gt;or&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;eval ISSUER_NAME = coalesce(ISSUER_NAME, if(TXN="33","XXX","N/A"))&lt;/LI-CODE&gt;</description>
      <pubDate>Tue, 20 Apr 2021 10:04:00 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Adding-field-to-event-without-altering-existing-field/m-p/548563#M155606</guid>
      <dc:creator>ITWhisperer</dc:creator>
      <dc:date>2021-04-20T10:04:00Z</dc:date>
    </item>
  </channel>
</rss>

