<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Splunk help in Splunk Search</title>
    <link>https://community.splunk.com/t5/Splunk-Search/Splunk-help/m-p/391364#M171071</link>
    <description>&lt;P&gt;I'm trying to eval value from subsearch&lt;BR /&gt;
ex searching specific data collecting them to multivalue field and pass to variable than search.&lt;BR /&gt;
Do splunk have variables something like global variables &lt;/P&gt;</description>
    <pubDate>Sat, 25 May 2019 20:47:24 GMT</pubDate>
    <dc:creator>borisk95</dc:creator>
    <dc:date>2019-05-25T20:47:24Z</dc:date>
    <item>
      <title>Splunk help</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Splunk-help/m-p/391362#M171069</link>
      <description>&lt;P&gt;I want to |search sourcetype=syslog | eval DATA=[search tratata | eval ip=somedata | return $ip] | search DATA&lt;BR /&gt;
Example of ip ( 127.0.0.1 , (answer=127.0.0.1))&lt;BR /&gt;
I get an error The number 127.0.0.1 is not valid.&lt;BR /&gt;
Trying to use | eval ip=tostring(ip) | return $ip do not help&lt;/P&gt;</description>
      <pubDate>Sat, 25 May 2019 15:27:50 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Splunk-help/m-p/391362#M171069</guid>
      <dc:creator>borisk95</dc:creator>
      <dc:date>2019-05-25T15:27:50Z</dc:date>
    </item>
    <item>
      <title>Re: Splunk help</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Splunk-help/m-p/391363#M171070</link>
      <description>&lt;P&gt;Please describe the problem you are trying to solve.  There may be a better way to do it.&lt;/P&gt;</description>
      <pubDate>Sat, 25 May 2019 20:43:27 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Splunk-help/m-p/391363#M171070</guid>
      <dc:creator>richgalloway</dc:creator>
      <dc:date>2019-05-25T20:43:27Z</dc:date>
    </item>
    <item>
      <title>Re: Splunk help</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Splunk-help/m-p/391364#M171071</link>
      <description>&lt;P&gt;I'm trying to eval value from subsearch&lt;BR /&gt;
ex searching specific data collecting them to multivalue field and pass to variable than search.&lt;BR /&gt;
Do splunk have variables something like global variables &lt;/P&gt;</description>
      <pubDate>Sat, 25 May 2019 20:47:24 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Splunk-help/m-p/391364#M171071</guid>
      <dc:creator>borisk95</dc:creator>
      <dc:date>2019-05-25T20:47:24Z</dc:date>
    </item>
    <item>
      <title>Re: Splunk help</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Splunk-help/m-p/391365#M171072</link>
      <description>&lt;P&gt;First run the subsearch by itself to verify you get the expected results.&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;search tratata | eval ip=somedata | return $ip
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;You may have better luck with&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;search tratata | eval ip=somedata | fields ip | format
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;Modify the search as needed to get the desired output.  Once you have the output as you like it, put the query together.&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;sourcetype=syslog | eval DATA=[search tratata | eval ip=somedata | fields ip | format] | search DATA
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;Or perhaps&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;sourcetype=syslog [search tratata | eval ip=somedata | fields ip | format] 
&lt;/CODE&gt;&lt;/PRE&gt;</description>
      <pubDate>Sat, 25 May 2019 22:58:14 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Splunk-help/m-p/391365#M171072</guid>
      <dc:creator>richgalloway</dc:creator>
      <dc:date>2019-05-25T22:58:14Z</dc:date>
    </item>
    <item>
      <title>Re: Splunk help</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Splunk-help/m-p/391366#M171073</link>
      <description>&lt;P&gt;Hi @borisk95,&lt;/P&gt;

&lt;P&gt;You can run the following search for the same results if you're trying to filter on the DATA field :&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt; |search sourcetype=syslog [search tratata | eval ip=somedata|rename ip AS DATA | return $DATA] 
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;Cheers,&lt;BR /&gt;
David&lt;/P&gt;</description>
      <pubDate>Sun, 26 May 2019 07:31:53 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Splunk-help/m-p/391366#M171073</guid>
      <dc:creator>DavidHourani</dc:creator>
      <dc:date>2019-05-26T07:31:53Z</dc:date>
    </item>
    <item>
      <title>Re: Splunk help</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Splunk-help/m-p/391367#M171074</link>
      <description>&lt;P&gt;The reason is to search some value, eval this as a value or combined multivalie and search eval field=1 as | search 1&lt;/P&gt;</description>
      <pubDate>Sun, 26 May 2019 12:30:32 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Splunk-help/m-p/391367#M171074</guid>
      <dc:creator>borisk95</dc:creator>
      <dc:date>2019-05-26T12:30:32Z</dc:date>
    </item>
  </channel>
</rss>

