<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Eval search help... can't seem to get it right. in Splunk Search</title>
    <link>https://community.splunk.com/t5/Splunk-Search/Eval-search-help-can-t-seem-to-get-it-right/m-p/178472#M51323</link>
    <description>&lt;P&gt;Hello,&lt;/P&gt;

&lt;P&gt;I am somewhat new to splunk but I am having issues creating a table for a search I am doing and I need assistance please.&lt;/P&gt;

&lt;P&gt;Example log:&lt;/P&gt;

&lt;P&gt;vip:vip_name_goes_here dns_response:0.008 http_code:200 time_total:0.523 url_effective:url_goes_here:80&lt;/P&gt;

&lt;P&gt;Search query I am trying to execute:&lt;/P&gt;

&lt;P&gt;index=* host=kjones* sourcetype="viphealth" | eval http_code="http_code:" | eval vip="vip:" | eval dns_response="dns_response:" | eval time_total="time_total:" | eval url_effective="url_effective" | table vip dns_response http_code time_total url_effective&lt;/P&gt;

&lt;P&gt;I know its wrong but how do I evaluate the sources defined in the log above? I have the ability to change the output of the log to different interesting fields if needed. I just want a table that will give me stats of all logs for these type. &lt;/P&gt;

&lt;P&gt;Example of how I want table to show:&lt;/P&gt;

&lt;P&gt;vip     dns_response    http_code   time_total  url_effective&lt;BR /&gt;
vip:vip_name_goes_here dns_response:0.008 http_code:200 time_total:0.523 url_effective:url_goes_here&lt;/P&gt;

&lt;P&gt;Thanks for any help you can be.&lt;/P&gt;</description>
    <pubDate>Mon, 28 Sep 2020 16:43:24 GMT</pubDate>
    <dc:creator>kj384g</dc:creator>
    <dc:date>2020-09-28T16:43:24Z</dc:date>
    <item>
      <title>Eval search help... can't seem to get it right.</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Eval-search-help-can-t-seem-to-get-it-right/m-p/178472#M51323</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;

&lt;P&gt;I am somewhat new to splunk but I am having issues creating a table for a search I am doing and I need assistance please.&lt;/P&gt;

&lt;P&gt;Example log:&lt;/P&gt;

&lt;P&gt;vip:vip_name_goes_here dns_response:0.008 http_code:200 time_total:0.523 url_effective:url_goes_here:80&lt;/P&gt;

&lt;P&gt;Search query I am trying to execute:&lt;/P&gt;

&lt;P&gt;index=* host=kjones* sourcetype="viphealth" | eval http_code="http_code:" | eval vip="vip:" | eval dns_response="dns_response:" | eval time_total="time_total:" | eval url_effective="url_effective" | table vip dns_response http_code time_total url_effective&lt;/P&gt;

&lt;P&gt;I know its wrong but how do I evaluate the sources defined in the log above? I have the ability to change the output of the log to different interesting fields if needed. I just want a table that will give me stats of all logs for these type. &lt;/P&gt;

&lt;P&gt;Example of how I want table to show:&lt;/P&gt;

&lt;P&gt;vip     dns_response    http_code   time_total  url_effective&lt;BR /&gt;
vip:vip_name_goes_here dns_response:0.008 http_code:200 time_total:0.523 url_effective:url_goes_here&lt;/P&gt;

&lt;P&gt;Thanks for any help you can be.&lt;/P&gt;</description>
      <pubDate>Mon, 28 Sep 2020 16:43:24 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Eval-search-help-can-t-seem-to-get-it-right/m-p/178472#M51323</guid>
      <dc:creator>kj384g</dc:creator>
      <dc:date>2020-09-28T16:43:24Z</dc:date>
    </item>
    <item>
      <title>Re: Eval search help... can't seem to get it right.</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Eval-search-help-can-t-seem-to-get-it-right/m-p/178473#M51324</link>
      <description>&lt;P&gt;Hi there&lt;/P&gt;

&lt;P&gt;Have you done any extractions from your events as yet?&lt;/P&gt;</description>
      <pubDate>Mon, 26 May 2014 22:01:06 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Eval-search-help-can-t-seem-to-get-it-right/m-p/178473#M51324</guid>
      <dc:creator>denisevw</dc:creator>
      <dc:date>2014-05-26T22:01:06Z</dc:date>
    </item>
    <item>
      <title>Re: Eval search help... can't seem to get it right.</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Eval-search-help-can-t-seem-to-get-it-right/m-p/178474#M51325</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;

&lt;P&gt;Thanks for the reply.&lt;/P&gt;

&lt;P&gt;No. I am not sure how to do that? Would I need to use the rex command?&lt;/P&gt;</description>
      <pubDate>Mon, 26 May 2014 22:04:23 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Eval-search-help-can-t-seem-to-get-it-right/m-p/178474#M51325</guid>
      <dc:creator>kj384g</dc:creator>
      <dc:date>2014-05-26T22:04:23Z</dc:date>
    </item>
    <item>
      <title>Re: Eval search help... can't seem to get it right.</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Eval-search-help-can-t-seem-to-get-it-right/m-p/178475#M51326</link>
      <description>&lt;P&gt;That fixed it thanks! I didn't know how to extract fields.&lt;/P&gt;</description>
      <pubDate>Mon, 26 May 2014 22:24:07 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Eval-search-help-can-t-seem-to-get-it-right/m-p/178475#M51326</guid>
      <dc:creator>kj384g</dc:creator>
      <dc:date>2014-05-26T22:24:07Z</dc:date>
    </item>
  </channel>
</rss>

