<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: How to &amp;quot;Bucket&amp;quot; Certain Field Values into a new Field? in Splunk Search</title>
    <link>https://community.splunk.com/t5/Splunk-Search/How-to-quot-Bucket-quot-Certain-Field-Values-into-a-new-Field/m-p/634817#M220548</link>
    <description>&lt;P&gt;A series of case statement should do the job.&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;| inputlookup mylookup.csv
| eval Desktop = case(match(OS, "Windows 10"), 1, 1==1, null())
| eval Server = case(match(OS, "Windows Server"), 1, 
                     match(OS, "Red Hat"), 1,
                     ``` Insert matches for other OSs here```
                     1==1, null())
| eval Network = case(match(OS, "Cisco", 1,
                      match(OS, "CentOS Linux", 1,
                      1==1, null())&lt;/LI-CODE&gt;</description>
    <pubDate>Thu, 16 Mar 2023 19:16:54 GMT</pubDate>
    <dc:creator>richgalloway</dc:creator>
    <dc:date>2023-03-16T19:16:54Z</dc:date>
    <item>
      <title>How to "Bucket" Certain Field Values into a new Field?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-quot-Bucket-quot-Certain-Field-Values-into-a-new-Field/m-p/634795#M220538</link>
      <description>&lt;P&gt;I have a lookup of vulnerability scan data that includes fields such as hostname, IP, OS, CVEs, etc. I would like to put all OSs that are specified as a desktop OS as a field value&amp;nbsp; named Desktop; anything that is specified as a server OS as a field value named Server but add an extra layer of specification if it's Unix or Windows; and anything with a network OS specified as Network and then put those field values in a new field called OS_Specified&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Here is an example of the OS's I would like to categorize.&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;
&lt;P&gt;Desktop&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;SPAN&gt;Windows 10 Enterprise 64 bit Edition Version 1803&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;SPAN&gt;Windows 10 Enterprise 64 bit Edition Version 21H1&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;SPAN&gt;Windows 10&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;SPAN&gt;Server&lt;/SPAN&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;SPAN&gt;Red Hat Enterprise Linux 8.7&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;SPAN&gt;Windows Server 2012 R2 Datacenter 64 bit Edition&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;SPAN&gt;Windows Server 2016 Datacenter Version 1607&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;SPAN&gt;Network&lt;/SPAN&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;SPAN&gt;Cisco Nexus Switch&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;SPAN&gt;CentOS Linux 8.4.2105&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;SPAN&gt;I'm assuming eval and/or rex is going to need to be involved, and that is where I would need assistance.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;I feel like my ask is similar&amp;nbsp;to&amp;nbsp;&lt;A href="https://community.splunk.com/t5/Splunk-Search/Combining-Multivalues-together-inside-a-field/td-p/86757" target="_self"&gt;This &lt;/A&gt;&amp;nbsp;but a little more involved.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 16 Mar 2023 19:09:27 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-quot-Bucket-quot-Certain-Field-Values-into-a-new-Field/m-p/634795#M220538</guid>
      <dc:creator>atebysandwich</dc:creator>
      <dc:date>2023-03-16T19:09:27Z</dc:date>
    </item>
    <item>
      <title>Re: How to "Bucket" Certain Field Values into a new Field?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-quot-Bucket-quot-Certain-Field-Values-into-a-new-Field/m-p/634817#M220548</link>
      <description>&lt;P&gt;A series of case statement should do the job.&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;| inputlookup mylookup.csv
| eval Desktop = case(match(OS, "Windows 10"), 1, 1==1, null())
| eval Server = case(match(OS, "Windows Server"), 1, 
                     match(OS, "Red Hat"), 1,
                     ``` Insert matches for other OSs here```
                     1==1, null())
| eval Network = case(match(OS, "Cisco", 1,
                      match(OS, "CentOS Linux", 1,
                      1==1, null())&lt;/LI-CODE&gt;</description>
      <pubDate>Thu, 16 Mar 2023 19:16:54 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-quot-Bucket-quot-Certain-Field-Values-into-a-new-Field/m-p/634817#M220548</guid>
      <dc:creator>richgalloway</dc:creator>
      <dc:date>2023-03-16T19:16:54Z</dc:date>
    </item>
  </channel>
</rss>

