<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Device names (normally static data) have changed in Splunk Search</title>
    <link>https://community.splunk.com/t5/Splunk-Search/Device-names-normally-static-data-have-changed/m-p/153845#M43206</link>
    <description>&lt;P&gt;A couple of ideas spring to mind.&lt;/P&gt;

&lt;P&gt;1) you can create a lookup table with the old and new names and make it an automatic lookup. See the &lt;A href="http://docs.splunk.com/Documentation/Splunk/latest/Knowledge/Aboutlookupsandfieldactions"&gt;Lookups and Workflow actions&lt;/A&gt; in the Knowledge Manager Manual.&lt;/P&gt;

&lt;P&gt;2) you can create field aliases to do something similar.  See &lt;A href="http://docs.splunk.com/Documentation/Splunk/latest/Knowledge/Tagthehostfield"&gt;Tags and Aliases&lt;/A&gt;  in the Knowledge Manager Manual&lt;/P&gt;

&lt;P&gt;Personally, I would probably go with the lookup table.  I suspect you've got something mapping the old name and new name already.  It wouldn't take much to export that as a CSV and create the automatic lookup.&lt;/P&gt;</description>
    <pubDate>Tue, 06 May 2014 14:48:18 GMT</pubDate>
    <dc:creator>jimodonald</dc:creator>
    <dc:date>2014-05-06T14:48:18Z</dc:date>
    <item>
      <title>Device names (normally static data) have changed</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Device-names-normally-static-data-have-changed/m-p/153844#M43205</link>
      <description>&lt;P&gt;We recently implemented a new naming convention for devices logging to Splunk a managing device. The only way of determining that an event came from a specific device is from the device name field in the event. I want to do a daily average of the event counts from each device but the numbers are off because the values in the device name field have changed.&lt;/P&gt;

&lt;P&gt;There isn't another piece of data available in the logs that are fed into Splunk that I can use instead so my question is whether there is a way to combine the old and new device names so that the stats are more accurate?&lt;/P&gt;

&lt;P&gt;Any suggestions would be greatly appreciated.&lt;/P&gt;</description>
      <pubDate>Tue, 06 May 2014 14:29:39 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Device-names-normally-static-data-have-changed/m-p/153844#M43205</guid>
      <dc:creator>jdaivs</dc:creator>
      <dc:date>2014-05-06T14:29:39Z</dc:date>
    </item>
    <item>
      <title>Re: Device names (normally static data) have changed</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Device-names-normally-static-data-have-changed/m-p/153845#M43206</link>
      <description>&lt;P&gt;A couple of ideas spring to mind.&lt;/P&gt;

&lt;P&gt;1) you can create a lookup table with the old and new names and make it an automatic lookup. See the &lt;A href="http://docs.splunk.com/Documentation/Splunk/latest/Knowledge/Aboutlookupsandfieldactions"&gt;Lookups and Workflow actions&lt;/A&gt; in the Knowledge Manager Manual.&lt;/P&gt;

&lt;P&gt;2) you can create field aliases to do something similar.  See &lt;A href="http://docs.splunk.com/Documentation/Splunk/latest/Knowledge/Tagthehostfield"&gt;Tags and Aliases&lt;/A&gt;  in the Knowledge Manager Manual&lt;/P&gt;

&lt;P&gt;Personally, I would probably go with the lookup table.  I suspect you've got something mapping the old name and new name already.  It wouldn't take much to export that as a CSV and create the automatic lookup.&lt;/P&gt;</description>
      <pubDate>Tue, 06 May 2014 14:48:18 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Device-names-normally-static-data-have-changed/m-p/153845#M43206</guid>
      <dc:creator>jimodonald</dc:creator>
      <dc:date>2014-05-06T14:48:18Z</dc:date>
    </item>
    <item>
      <title>Re: Device names (normally static data) have changed</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Device-names-normally-static-data-have-changed/m-p/153846#M43207</link>
      <description>&lt;P&gt;If you device name has changed with a specific pattern, you can update the old values in device name field with new values  (using rex/eval).&lt;/P&gt;</description>
      <pubDate>Tue, 06 May 2014 16:13:45 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Device-names-normally-static-data-have-changed/m-p/153846#M43207</guid>
      <dc:creator>somesoni2</dc:creator>
      <dc:date>2014-05-06T16:13:45Z</dc:date>
    </item>
    <item>
      <title>Re: Device names (normally static data) have changed</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Device-names-normally-static-data-have-changed/m-p/153847#M43208</link>
      <description>&lt;P&gt;Here is the search I am using to get the daily average&lt;/P&gt;

&lt;P&gt;sourcetype=ids_alerts &lt;BR /&gt;
| stats count BY DEVICE_NAME, date_month, date_mday &lt;BR /&gt;
| stats avg(count) AS "Daily Average" BY DEVICE_NAME&lt;BR /&gt;
&lt;LAST 90="" days=""&gt;&lt;/LAST&gt;&lt;/P&gt;

&lt;P&gt;I do have a old-to-new name table but there are only a handful of the older device names showing and eventually are going to age off. So I don't know that a lookup table will be ideal (but would be good to know how). I have tagged the older names with the newer name but I am unclear on how to merge the tag in place of the old device name.&lt;/P&gt;</description>
      <pubDate>Mon, 28 Sep 2020 16:32:59 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Device-names-normally-static-data-have-changed/m-p/153847#M43208</guid>
      <dc:creator>jdaivs</dc:creator>
      <dc:date>2020-09-28T16:32:59Z</dc:date>
    </item>
    <item>
      <title>Re: Device names (normally static data) have changed</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Device-names-normally-static-data-have-changed/m-p/153848#M43209</link>
      <description>&lt;P&gt;I appreciate this but although the new naming convention has a pattern, the old one does not.&lt;/P&gt;</description>
      <pubDate>Tue, 06 May 2014 19:21:58 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Device-names-normally-static-data-have-changed/m-p/153848#M43209</guid>
      <dc:creator>jdaivs</dc:creator>
      <dc:date>2014-05-06T19:21:58Z</dc:date>
    </item>
    <item>
      <title>Re: Device names (normally static data) have changed</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Device-names-normally-static-data-have-changed/m-p/153849#M43210</link>
      <description>&lt;P&gt;Since you've tagged the old hostnames with the new, there should not be anything left to do.  Just run your searches with the new hostname.  If your search crosses over into the time range with the old hostname, the tags should override the old hostname with the tag you set.&lt;/P&gt;

&lt;P&gt;As for how do do the lookup table, Splunk has a great video explaining it.  See &lt;A href="http://www.splunk.com/view/SP-CAAAE3F"&gt;http://www.splunk.com/view/SP-CAAAE3F&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 06 May 2014 20:04:39 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Device-names-normally-static-data-have-changed/m-p/153849#M43210</guid>
      <dc:creator>jimodonald</dc:creator>
      <dc:date>2014-05-06T20:04:39Z</dc:date>
    </item>
    <item>
      <title>Re: Device names (normally static data) have changed</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Device-names-normally-static-data-have-changed/m-p/153850#M43211</link>
      <description>&lt;P&gt;Using a combination of both recommendations I managed to solve my problem. First, I tagged the old device names that were showing up with the new device names. Then I used eval coalesce() recommended when I asked a similar question. &lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt; &amp;lt;my search criteria&amp;gt; | eval DEVICE_NAME=coalesce(tag,DEVICE_NAME) | stats count BY DEVICE_NAME, date_month, date_mday | stats avg(count) AS "Average_Alert_Count" BY DEVICE_NAME | eval Average_Alert_Count=round(Average_Alert_Count,2) 
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;The next thing I want to do is show the event count for the last 24 hours compared to the average. I am reviewing some of the other documentation/answers on the site for pointers, but step one is done! Thanks for the help.&lt;/P&gt;</description>
      <pubDate>Thu, 08 May 2014 17:44:18 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Device-names-normally-static-data-have-changed/m-p/153850#M43211</guid>
      <dc:creator>jdaivs</dc:creator>
      <dc:date>2014-05-08T17:44:18Z</dc:date>
    </item>
    <item>
      <title>Re: Device names (normally static data) have changed</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Device-names-normally-static-data-have-changed/m-p/153851#M43212</link>
      <description>&lt;P&gt;Unfortunately I cannot view the video from work. If this is the case, though I would have to assume that there is something on the back-end that isn't set up correctly for this to work since this did not happen natively.&lt;/P&gt;</description>
      <pubDate>Thu, 08 May 2014 17:47:39 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Device-names-normally-static-data-have-changed/m-p/153851#M43212</guid>
      <dc:creator>jdaivs</dc:creator>
      <dc:date>2014-05-08T17:47:39Z</dc:date>
    </item>
  </channel>
</rss>

